TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A key-infra open-source project can get compromised

56 点作者 urlwolf将近 3 年前

10 条评论

lionkor将近 3 年前
&gt; To make clear to everyone that I&#x27;m absolutely not joking:<p>&gt; $ base64 private.key<p>&gt; RBjU5k0Dfdqtyzx4ox6PfQoqrdCft&#x2F;aFJieD2DQvloY=<p>&gt; I&#x27;m publically leaking the key myself now. Don&#x27;t trust it.<p>What?<p><a href="https:&#x2F;&#x2F;github.com&#x2F;lawl&#x2F;NoiseTorch&#x2F;releases&#x2F;tag&#x2F;0.11.6" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;lawl&#x2F;NoiseTorch&#x2F;releases&#x2F;tag&#x2F;0.11.6</a>
评论 #31446084 未加载
lionkor将近 3 年前
The actual content is here: <a href="https:&#x2F;&#x2F;github.com&#x2F;lawl&#x2F;NoiseTorch" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;lawl&#x2F;NoiseTorch</a><p>The article just (badly) sums up what you can find in the release notes, the issues, and the readme.
jka将近 3 年前
One of the largest risks of project-owner compromise to everyday users and businesses would, I think, be from widely used software where automated updates occur.<p>That leads to an argument for updates being performed manually after inspection of the changes involved.<p>Counter-arguments could include:<p>- Users will not care to see what has changed in an update<p>- Security updates are important to roll out immediately<p>Responses to <i>those</i> could include:<p>- Automated update rollout to the majority of users could be conditional on a smaller, inspective subset community of users manually examining and approving the update first (not too dissimilar to a Quality Assurance process). In the context of project owner compromise like the example in the article, this should catch the issue and prevent rollout to users. If an update is approved &quot;with concerns&quot;, then the review community is likely to share those concerns with a wider audience, leading to awareness and hopefully resolution.<p>- Security updates could be rolled out more quickly -- but with a requirement for sign-off by multiple security-focused engineers and product specialists. That could help to reduce exploit exposure time for users while providing for adequate review of changes (security fixes can, in themselves, be challenging to review and confirm).<p>Also potentially relevant to this topic: how would a community that uses proprietary software develop confidence in an update before choosing to apply it locally?
评论 #31446682 未加载
acatton将近 3 年前
&gt; a key-infra open source project<p>then proceeds to mention a project which is not officially packaged&#x2F;distributed by any of the major distributions.
bayesian_horse将近 3 年前
In my opinion there is not a lot of difference between a vulnerability that is introduced intentionally and one that is introduced unintentionally regarding their &quot;life cycle&quot;.<p>Trust is always relative. Just as in commercial software, trust in the original authors is never total and can only grow with continuous verification and non-exploitation.
WesolyKubeczek将近 3 年前
Dear Author&#x2F;Maintainer,<p>Why do you even accept giant patches which you can’t review?!
评论 #31445285 未加载
评论 #31447050 未加载
评论 #31445277 未加载
评论 #31445408 未加载
_wldu将近 3 年前
Everyone should PGP sign their git commits with a secret key stored on a YubiKey. Make small changes to your code, read the diff, then commit and sign before pushing to the repo. IMPO, that&#x27;s really the only way to protect the integrity of source code.<p>If you are adding large changes without carefully reading the diffs and you do not sign the commits it&#x27;s just a matter of time.
评论 #31448618 未加载
评论 #31447568 未加载
0xbadcafebee将近 3 年前
Oof, not a great situation. I hope the devs can do an audit and confirm their code looks good. The C code and models are the only thing that needs scrutiny.<p>However, if someone wanted to use this code immediately they could run it in a qemu VM and forward a port or something.
Gordonjcp将近 3 年前
It&#x27;s a bit unclear as to what&#x27;s going on there.<p>Is the codebase itself compromised? Did the developer&#x27;s computer get compromised?<p>Did one of the external libraries that it pulls in from git get compromised?
评论 #31445437 未加载
评论 #31445415 未加载
评论 #31445872 未加载
评论 #31445407 未加载
ushakov将近 3 年前
from license:<p>&gt; This program comes with ABSOLUTELY NO WARRANTY<p>when it says no warranty, they <i>mean it</i>