this post was submitted on 29 Mar 2024
173 points (98.3% liked)

Selfhosted

40347 readers
463 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] tal@lemmy.today 22 points 8 months ago* (last edited 8 months ago)

I bet that you use software packages that are built and authored on systems that have systemd+sshd, though.

What happens if development or build machines belong to people who control projects that you trust and have been compromised?

Do you use a web browser? Do you use a graphical desktop environment? Are the machines those guys use vulnerable? Are the developers of the libraries that they depend on vulnerable?

Remember, this guy was attacking a downstream project (sshd) by compromising and signing source in a specific tarball of a library -- the malicious code never made it into git -- used by an unrelated piece of software (systemd) that some distros, not even the ssh guys, happened to link into sshd's memory space. He's trying to compromise unrelated software via elaborate supply chain attacks.