Understanding the Linux Backdoor: Implications for Open Source [When Penguins Cry]

  Рет қаралды 277,226

Dave's Garage

Dave's Garage

2 ай бұрын

Dave explains the new backdoor in SSH. For my book on life on the Spectrum: amzn.to/49sCbbJ
Any requests to contact me on Telegram, etc, are scams...
Follow me on Facebook at davepl for daily shenanigans!
Follow me on Twitter at @davepl1968
Image Credit: Medium.com

Пікірлер: 2 000
@jthoward
@jthoward 2 ай бұрын
I should note that the individual/group who injected the attack had spent years on a social engineering campaign to gain trust and get authority as a maintainer
@moetocafe
@moetocafe 2 ай бұрын
*the agency
@mattbba8451
@mattbba8451 2 ай бұрын
Spook. E.
2 ай бұрын
So we can safely assume, fixes tin hat, that he had his target all prepared, knew that it would fixed super fast, so he prepared to execute his attack and is now fulfilled. I wonder who the target was… removes tin hat.
@1kreature
@1kreature 2 ай бұрын
Lines up well with Russian timing tho? Step 1: Ukraine Step 2: The world?
@raiden24
@raiden24 2 ай бұрын
@ It's pretty clear that they were hoping it would get into the stable release given that they submitted their updated version to Debian when it was close to releasing a new stable version. Remember Debian was supposed to have a new stable release out in 2 days from now and the attacker was trying hard to get it into that release. They definitely did not fulfill their goals, whoever the target was they got very lucky.
@SirHackaL0t.
@SirHackaL0t. 2 ай бұрын
Closed source could have backdoors already and we’ll never know as we can’t inspect the code.
@wardm4
@wardm4 2 ай бұрын
Yes. The correct analogy is not internal Microsoft testing (they obviously wouldn't have caught something this subtle). It's imagining a developer running benchmarks on Windows, finding something taking 0.5 seconds longer than it should, and then not being able to explore what's causing it. So they, what, email Microsoft tech support and explain something is taking 0.5 seconds too long and should look into it? This shows the danger of closed source. That email will just get deleted due to how silly it sounds and the exploit will exist in production code forever, never being caught.
@SteveJones172pilot
@SteveJones172pilot 2 ай бұрын
Solarwinds
@sytranvn
@sytranvn 2 ай бұрын
Meanwhile Windows takes like forever to update, can any one check if it is backdoored?
@nothingisreal6345
@nothingisreal6345 2 ай бұрын
We don't know it but we I'm sure. Is that your logic?
@perwestermark8920
@perwestermark8920 2 ай бұрын
​@@wardm4 Some functions *are* benchmarked. But it depends more on if it's a function expecting many uses. So if syndicating account login to a separate server, then the login process should be part of a benchmark to verify how many login/hour such a server can handle. But it isn't likely a single-user login would be benchmarked, since it isn't part of some critical capacity pipeline. So I would be very surprised if Microsoft would have caught this. But if an AD server can handle less requests/second, then that is very likely to be quickly caught.
@WyattWingo
@WyattWingo 2 ай бұрын
The human engineering part of this backdoor is equally as interesting.
@abarratt8869
@abarratt8869 2 ай бұрын
It is, and it’s shown that OSS’s biggest attack surface is the humans. That’s also true of closed source software of course, but one assumes that a company paying salaries to developers has some idea who those developers really are. With OSS, we don’t and nor does anyone else. My worry is that as more package maintainers retire this is going to become easier to pull off. To guard against that there’d be pressure for maintainers to hand ownership over to some trustworthy organisation. Who is that? The danger is that it becomes RedHat. And then they own more and more of Linux. They already effectively own systems Wayland and gnome, they could be in line to own even more.
@IMBlakeley
@IMBlakeley 2 ай бұрын
Exactly they preyed on the developer who was alone, stressed and feeling the pinch. It went on for a while with several people or puppets involved.
@SXZ-dev
@SXZ-dev 2 ай бұрын
I still wonder if "Jia Tan" was always a hacker or was originally a college kid who eventually was contacted by his national secret police to collaborate with them and inject the backdoor into XZ after they had gained the trust of the community
@jgarner1104
@jgarner1104 2 ай бұрын
@@abarratt8869 It is also the largest attack vector
@sittingstill3578
@sittingstill3578 2 ай бұрын
Where is he from?
@wyatt8770
@wyatt8770 2 ай бұрын
something super important here; xz-utils isn't part of the kernel whatsoever. This wouldn't end up on Linus' desk like a change to the kernel would.
@DavesGarage
@DavesGarage 2 ай бұрын
I agree, but for precision, I never said it was part of the kernel, of course.
@JonBrase
@JonBrase 2 ай бұрын
But when people in the community say "in Linux", they generally mean the kernel. It's like saying "in NT" when discussing Windows. "In systemd" would be more accurate than "in Linux", but still completely untrue. It would, however, win you brownie points with the systemd haters, who tend to think that the architectural philosophy behind systemd is just asking for something like this.
@EinChris75
@EinChris75 2 ай бұрын
@@JonBrase It's even more more like saying "in Windows", when IIS has a bug.
@paristo
@paristo 2 ай бұрын
When common people say "Linux", they mean the whole software system, not the operating system that Linus maintains even today. Even the word "distribution" goes past most people not understanding what it means, why they mistake it as well to "different OS". So common people make wild claims that if any software that isn't part of the OS gets bad things happen, then it is the OS. The problem is that not even most software engineers understand what OS is, what it does, what is its purpose. It is simple really, but not as simple as walking someone at their car and opening engine hood and show them where their car engine and all other different parts inside the engine compartment, as not everything in there is part of the engine. But at least most people understand that car isn't engine, and engine isn't a car like people think about software systems and operating systems. Why word "Linux" is always causing misinformation when it is used to talk about anything else than the operating system itself, aka "Linux Kernel".
@gfimadcat
@gfimadcat 2 ай бұрын
@@JonBrase there is, however, no denying that systemd is a steaming pile of kaka - regardless of it's philosophies.
@stevenbrudenell
@stevenbrudenell 2 ай бұрын
Some will see this as a failing of open source. I invite them to read about the Sony rootkit scandal of 2005, in which a "real" company installed rootkits on millions of PCs. If closed-source software is no defense against threats, I for one would rather live in the open-source world where there's at least a chance to discover them.
@LendriMujina
@LendriMujina 2 ай бұрын
Ohhhh yeah, I remember that. IIRC, the Sony CEO(?) when confronted about it basically went "it's fine that we did this because most people don't know what a rootkit is, and what you don't know can't hurt you". Even the most tech-illiterate people can probably tell *something* is wrong with that attitude, even if they don't know exactly what.
@xXx_Regulus_xXx
@xXx_Regulus_xXx 2 ай бұрын
@@LendriMujina assuming they actually used the word "rootkit" it should sound dubious enough to the average person that the flippant attitude towards it being discovered by the CEO should warrant suspicion
@IceBlueBeard
@IceBlueBeard 2 ай бұрын
@@LendriMujina It was even worse than that. The Sony rootkit used cloaking functionality which could be reused and several viruses actually used the built in cloaking functionaliy of the rootkit to hide their viruses from anti-virus programs, basically making themselves invisible to operating system and apps.
@jimspc07
@jimspc07 2 ай бұрын
Sony seemed unable to see what the problem was. They were just doing what they wanted. You must remember that Sony has authority, granted by Sony, to do anything that Sony wants to enable Sony to fulfil its right to do anything that Sony wants.
@justice4all719
@justice4all719 2 ай бұрын
Truth being said here. Open source is ideal to spot weaknesses, backdoors, etc and correct them. A private company would probably have hidden this
@rich1051414
@rich1051414 2 ай бұрын
Open source may have allowed in the compromised code, but it also allowed for the compromised code to be caught. So whether this is 'good' or 'bad' for the reputation of open source, to me, it cancels itself out. But it will surely also make open source better for it, as everyone is now made more aware of the potential vector of compromise.
@ned418
@ned418 2 ай бұрын
This is the strength of open source.
@rainerwahnsinn3265
@rainerwahnsinn3265 2 ай бұрын
Don't even mention the time period between discovery and fix. Microsoft isn't even dreaming about those response times. Btw. Which OS are they using for their Azure Cloud. Windows server right? 😅
@stefan0206
@stefan0206 2 ай бұрын
The problem is that the amount of people that can do meaningful code reviews is relatively limited. While in theory open source code can be reviewed by all and will be reviewed, the practice is different. More often then not important libs like this are maintained by just one or two persons.
@Obscurai
@Obscurai 2 ай бұрын
One of the issues with Open Source is weak identity verification of the contributors. At this point, the alias of the contributor is known but their real identity is unknown. It could be a state actor or an individual, no one knows.
@KeithBoehler
@KeithBoehler 2 ай бұрын
The other thing is that a large company like MS does take things seriously and check their stuff. Does a smaller company? Or what about one that makes software for their bespoke hardware? We do have a somewhat recent supply chain attack on the proprietary side of things with Solar Winds hack.
@_sneer_
@_sneer_ 2 ай бұрын
Microsoft watches the code very carefully, to make sure that only their malware goes into their software.
@emptylog933
@emptylog933 2 ай бұрын
Win10 ltsc is actually pretty great though, can't really understand the hate.
@wildonemeister
@wildonemeister 2 ай бұрын
@@emptylog933 If you are used to the speed and user friendly Windows 7 you will hate Windows 10 and Windows 11 a lot.
@pablovirus
@pablovirus 2 ай бұрын
@@emptylog933 It made A LOT of stupid anti-user friendliness changes from Windows 7 to accommodate dumb users (and/or tablet users) that it's infuriating. Also the forced updates, forced maintenance, forced bloatware, forced fucking everything makes it a chore to use. Sure there are improvements in some regards but there's so many annoying details and major issues that go unfixed (like the 100% HDD usage even on clean installs) that it makes using Win10 a shitty experience for many.
@squirlmy
@squirlmy 2 ай бұрын
@@emptylog933For one thing, Microsoft's aggressive campaign for everyone to upgrade to Windows 11. The fact you have to refer to "ltsc" should make that evident.
@Olgasys
@Olgasys 2 ай бұрын
ROTFL just like Google which does ultra deep antivirus scanning without user consent and keeps stats for Google as a bonus. Google Play Services basically runs as root and actually owns your life.
@DrWrapperband
@DrWrapperband Ай бұрын
The Linux Backdoor was found, only God knows how many backdoors are in Windows.
@nessunolinux
@nessunolinux Ай бұрын
Microsoft has publicly known of one major backdoor being utilized by hackers, the US government, and even foreign governments for over four years now, and still hasn't patched it. Pegasus.
@zed5129
@zed5129 17 күн бұрын
/facepalm
@nessunolinux
@nessunolinux 17 күн бұрын
I'm utterly disappointed my comment has been seemingly deleted. We DO know of multiple backdoors in Windows that still have not been patched. There, maybe this one won't get deleted.
@herpederpe4320
@herpederpe4320 9 күн бұрын
One of stuxnets zero-days a backdoor in the elliptic curve used for auth in windows install. Then we also have the older _NSAKEY which was the same thing, but older.
@brianrothrock5893
@brianrothrock5893 5 күн бұрын
According to the author of this video, windows has no back doors … 😂😂😂😂😂😂😂
2 ай бұрын
Makes you think about how many backdoors we will never catch because of closed source.
@werethless12
@werethless12 2 ай бұрын
Ding ding ding!
@no_name4796
@no_name4796 2 ай бұрын
And many are probably INTENTIONAL. Just think about how the UK government wanted to pass a law to basically force backdoors into messaging apps, for example. Or in a way you could consider telemetry as a sort of backdoor as it basically grants unlimited access to your data to the companies. Open source should be the standard, if we actually want safe code
@MelodicTurtleMetal
@MelodicTurtleMetal 2 ай бұрын
If someone told me the CIA had backdoors to all ios and android versions, I'd only half doubt them.
@CoolKoon
@CoolKoon 2 ай бұрын
@@no_name4796 "Just think about how the UK government wanted to pass a law to basically force backdoors into messaging apps, for example." - Actually they DID pass that law...
@seedney
@seedney 2 ай бұрын
@@CoolKoon yeah... And what about the apps that won't comply? They probalby install CA cert in your machine to doesn't have JUST your messages, but ALL your traffic yeah?
@Fenrasulfr
@Fenrasulfr 2 ай бұрын
What is scary is that the maintainer that created this backdoor, worked on getting trust over the course of several years. This was most likely some coordinated attack of a group that wanted a zero day into most servers in the world. I wonder if there are other projects that have been compromised in such a way.
@fuzzy1dk
@fuzzy1dk 2 ай бұрын
it also means everything done by that maintainer is suspect, going over two years of history to check if there isn't anything else nefarious probably isn't a small task
@pietersmit621
@pietersmit621 2 ай бұрын
If they put that much effort into getting trust for an open-source project, how much more likely are sponsored people to be working at closed-source companies e.g. Microsoft, AWS, Oracle, Okta, Azure, Google, LastPass, Antivirus providers with nefarious goals?
@Fenrasulfr
@Fenrasulfr 2 ай бұрын
@@pietersmit621 Probably even more, but by compromising the linux kernel, they will compromise all those big companies. At the very least we should start looking at how we could harden open source projects from such attacks. This was pretty much a wake up call.
@fuzzy1dk
@fuzzy1dk 2 ай бұрын
@@pietersmit621 As Dave said, those big companies have a process and more people looking at everything so you'd have to get many more people involved. Afaik this was a "small" project with a single overworked maintainer that was pushed to give the bad actor access
@DrewTNaylor
@DrewTNaylor 2 ай бұрын
Recently someone involved with F-Droid mentioned that a few years ago they had a similar situation happen where someone was really pushing for code to be merged that would allow SQL injections to happen in the app's search function and would result in a crash. They put off reviewing it, but when they did review it, the original submitter deleted their account to hide evidence. This could be related to the group behind the XZ backdoor, I think I heard.
@m4rt_
@m4rt_ 2 ай бұрын
actually, it was more hidden than just hidden in the makefiles where no one checked, it was a script only in the release tarballs that added some lines to the makefile if it met some conditions, which would then add in the backdoor. (this is mentioned in the original openwall post)
@The_Boctor
@The_Boctor 2 ай бұрын
GitHub allowing people to manipulate releases separately like that is a pretty exploitable feature, imo.
@nurmr
@nurmr 2 ай бұрын
95% of the chain was commit to git, the last, the last 5% that triggered the integration in the build process was added only as part of the release tarball.
@BrotherCheng
@BrotherCheng 2 ай бұрын
​@@nurmrSure, but that 5% that triggers it is the key trigger that would look suspicious for anyone who takes a closer look. The remaining 95% are the binary files in test folder, but you need a way to incorporate that in to the build system, and randomly grabbing test files during a build, and doing lots of decoding operations is going to raise eyebrows to whoever is reading it. Maybe it would have slipped in anyway since xz isn't super active, but someone like Lasse Collin (the other maintainer) might have noticed it. Hiding it in the release tarball and relying on the fact that no one checks the consistency of release artifacts is IMO the a key technique here, and it relies on maintainer access because this is something a contributor can never do.
@tymondabrowski12
@tymondabrowski12 2 ай бұрын
​@@BrotherCheng "rabdomly grabbing test files" was hidden too, there were some very weird obfuscated regexes that would only match those files.
@lewstherintelescope
@lewstherintelescope 2 ай бұрын
​@@The_BoctorGitHub's own tarballs are automatically generated, but you can attach any file you want to a release (otherwise it'd be a pretty shoddy distribution mechanism), and I guess for whatever reason it's a common practice in some projects for the devs to upload their own tars instead of using the automatic one? (I assume there's a reason for this since otherwise why bother with that effort, but I don't know enough to say what that reason is.)
@MrMonkeyCrumpets
@MrMonkeyCrumpets 2 ай бұрын
The more interesting comparison is how the back door was able to get there in the first place. In this case the attacker had to spend years building trust and with the maintainer, obfuscate the code and hope the malicious changes went unnoticed. In a closed system if you want a back door all you have to do is ask.
@__Brandon__
@__Brandon__ 2 ай бұрын
Or tell as is the case with publicly traded US companies
@stephanweinberger
@stephanweinberger 2 ай бұрын
And also rely on the fact that the library was only used in a roundabout way when a specially patched version of sshd was loaded via systemd. This attack is brilliant on multiple levels!
@__Brandon__
@__Brandon__ Ай бұрын
@@stephanweinberger I'm not sure it was brilliant. Certainly novel, but if you give any systems level dev who has a couple years of experience the same task they can likely all come up with something similarly hard to detect. The most clever thing about it is it uses a xz compressed file in the xz library to test xz for the backdoor. Everything else is just typical obfuscation which doesn't take much skill to create
@stephanweinberger
@stephanweinberger Ай бұрын
@@__Brandon__ It's not the obfuscation alone, but also how the backdoor is activated in the field: it's planted into sshd indirectly via systemd - both of which don't need to be touched in any way. That's thinking around _two_ corners...
@gregj.gotham4402
@gregj.gotham4402 22 күн бұрын
Sounds like the NSA, DOJ, CIA, or any other alphabet organization of the Government.
@ObiwanNekody
@ObiwanNekody 2 ай бұрын
Remember when the University of Minnesota got banned from kernel submissions?
@jackkraken3888
@jackkraken3888 2 ай бұрын
Yup, very naughty.
@MohammedShuayb
@MohammedShuayb 2 ай бұрын
Why were they banned if i may ask
@fjl05
@fjl05 2 ай бұрын
@@MohammedShuaybNo, you may not ask. Sorry.
@stevenchristenson2428
@stevenchristenson2428 2 ай бұрын
@@MohammedShuayb They were purposfully adding bad code into the project to see if people would catch them. They claimed it was because of some research they were trying to do but thats a load of horseshit and they were banned and still are from what I know for a very good reason.
@guilherme5094
@guilherme5094 2 ай бұрын
Yes.
@AdityaMehendale
@AdityaMehendale 2 ай бұрын
Someone went to the trouble of plotting all the "utils" baked into the core of Linux; made a scatter-plot of ubiquity on the y-axis and unsexy/sexyness on the X-axis, and number of active contributors on the Z-axis, and diligently chose the one in the top-left corner, with the fewest active contributors. That's pretty thorough, and the long-con hasn't even started... Scary stuff.
@hanslogo8114
@hanslogo8114 2 ай бұрын
The really shocking thing is the realization that such things would never be discovered in closed source because no one would be able to detect such irregular CPU spikes without the code.
@schwingedeshaehers
@schwingedeshaehers 2 ай бұрын
and that, at least most Microsoft products, aren't as optimized, so that half a second can't be noticed
@dpb22
@dpb22 2 ай бұрын
Good lord, large companies doing huge loads of time sensitive work open tickets routinely on closed sourced code everyday. I watched one get opened last week for millisecond spikes on storage after a new patch.
@wallacegrommet9343
@wallacegrommet9343 Ай бұрын
That would drive me nuts. Are those typical anomalies, or ominous indicators?
@RonJohn63
@RonJohn63 Ай бұрын
You obviously didn't even watch half of the video.
@hanslogo8114
@hanslogo8114 Ай бұрын
​@@RonJohn63 Why do you think so? Becaus he says ms has a better process?
@micwin2
@micwin2 18 күн бұрын
You asked for it, so... I very appreciate the effects of open source on the community, for example: - in my spare time, when learning a new programming language, having the actual source code as reference how other dudes did the stuff, instead of relying on documentation (which normally is behind). New developers are faster up to the game and in quality mode, which benefits all of us, not only the company with its proprietary coding guide lines. - having the ability to see how such hacks work because there are no interests involved by the owners of the code, lets say financial and pr. - being able to replace malicious code against the will of the owner if reluctant. - having closed source fan boys raising the quality of open source by reviewing code for the most dedicated attacks and zealously reporting them to the whole world to see, not understanding they make the whole point for open source :-) thank you very much
@m4rt_
@m4rt_ 2 ай бұрын
Fun fact, the guy who found it ("Andreas Freund") ... his last name ("Freund") means friend in German.
@blizzy78
@blizzy78 2 ай бұрын
also, their name is Andres
@elta6241
@elta6241 2 ай бұрын
It was a Postgres developer who found this.
@nostromza3433
@nostromza3433 2 ай бұрын
PSYOP
@gFamWeb
@gFamWeb 2 ай бұрын
I'm honestly quite disappointed you didn't do your research into this. The story of how it got into the source code is readily available and actually pretty interesting from a process perspective.
@ilarihalonen
@ilarihalonen Ай бұрын
Me myself don't want to google for xz utils right now. Might as well keep the tin hat on for some time. The more information you recieve, the more painful it gets. Anyway the guy behind Tukaani Project must be a Finn, since his name and the Project are in Finnish. This feels sad, because in Finland we just had our suicide wave after there was a hacker exploiting psychiatric data.
@coorbin
@coorbin 2 ай бұрын
On the other hand, Microsoft is a huge consumer of open source for their products now. Unless they give the same level of scrutiny and attention to all the open source software they consume before they deploy a product, they are just as vulnerable to a supply chain attack as SolarWinds or any other proprietary software company that has integrated a lot of open source projects into their software.
@jas88cam
@jas88cam 2 ай бұрын
That was one of the clever aspect - ssh is security sensitive so changes get checked thoroughly - but xzutils (or rather liblzma) isn’t normally used by ssh so doesn’t get checked the same way. Some configurations do happen to inject it, though, enabling this backdoor to trigger. Very very sneaky stuff, someone put a lot of time/money/work into injecting this code, to the extent of becoming a project maintainer just to do this.
@Milccbag
@Milccbag 2 ай бұрын
It sure would be bad if a state actor had a backdoor to systems or servers. Imagine Microsoft giving a federal agency access to journalists emails.
@benjaminlynch9958
@benjaminlynch9958 2 ай бұрын
To be fair, I don’t think journalists were the targets here. How many journalists use Linux??? My guess is this was supposed to be a cyber weapon to be used against a foreign adversary. The only thing that would truly be safe would be old systems that didn’t have the patch and air gapped systems that couldn’t directly connect to the outside world.
@xXx_Regulus_xXx
@xXx_Regulus_xXx 2 ай бұрын
@@benjaminlynch9958 yeah not many journalists, just most of the servers across the whole internet, nothin' big.
@BummersAbound
@BummersAbound 2 ай бұрын
Journalists work for the alphabet agencies anyway. They’d be spying on themselves.
@paulstimpson830
@paulstimpson830 2 ай бұрын
​​@@benjaminlynch9958most people use Linux or UNIX but don't realise they do. Android is Linux underneath. MacOS is a flavour of BSD with a custom desktop. If this hadn't been discovered it could have found its way into all kinds of systems. If you run Windows, many of the services you use run on Linux, that email website, your VPN, that website you use for managing your source code, they probably run Linux. If someone used a backdoor like this to attack a website like GitHub or JFrog, they could inject malicious into hundreds of products, both open and closed source. The potential implications are truly jaw dropping and could have let someone tamper with release builds of code running on pretty much anything where the developer used any of the common development management tools. This could even have had safety of life implications if the tampered code found its way into things like medical equipment, airliners or equipment in nuclear power plants. If someone intended to use this code to compromise a major cloud provider, the implications could be very serious including unauthorized access to even governmental or military systems. We can't assume this is the end of the matter. The goal might not have been to compromise every Linux server in the world. It might have been to compromise a particular developer or maintainer's machine to insert some other compromise that hasn't been detected yet. Such a person could already have run the code as they're likely to be on the bleeding edge. Hopefully, this was just someone's plan to steal a boat load of cash from somewhere like a bank or cryptocurrency exchange
@spvillano
@spvillano Ай бұрын
@@benjaminlynch9958 or *BSD or Solaris or... But yeah, Linux is rather popular, but for say government systems, one would still have to get past filters, firewalls and more to even try to log onto the server. So, they'd be looking at beyond difficult to access servers, with pinhole firewall entries for only the necessary services on the unclassified networks, all of the important traffic being on a number of classified networks that cannot be seen or see the internet or the unclassified network and are actually tunneled under it and one another, yeah, this would miss central government networks and basically nail provincial and municipal networks, as well as commercial and utilities networks. And utilities are a target of interest, as some high profile attacks on water supply networks have recently shown.
@seephor
@seephor 2 ай бұрын
Dave. I believe the exploit doesn't allow you to actually log in using SSH. I believe it allows them to put linux shell commands in the SSH authentication process itself and have sshd execute those commands with root access. I believe XD infected one of the encryption libraries in the sshd service. Very clever stuff. I saw a video of the live working demo of this yesterday. I'll try to link to it here.
@WarrenGarabrandt
@WarrenGarabrandt 2 ай бұрын
Yeah, it's complex, like VERY complex, but if you have the private key for it, and only 1 person presumably does, it allows you to run commands as root simply by sending a specially crafted handshake message that will trigger the backdoor and run the command embedded in the handshake message. Low level learning has an excellent video discussing how it works, and you can find the video here: vV_WdTBbww4
@joshallen128
@joshallen128 2 ай бұрын
@@WarrenGarabrandt so many suspects even freund himself because of his connection with microsoft.
@elta6241
@elta6241 2 ай бұрын
Dave doesn't understand it. It was done in this manner because they knew they could never get to SSH directly. It is very clever stuff, and it should make us all wonder about whether there are backdoors in closed source software like this that would never otherwise be detected. The very same techniques can be used.
@joshallen128
@joshallen128 2 ай бұрын
like a third party attack@@elta6241
@EmilioBPedrollo
@EmilioBPedrollo 2 ай бұрын
Which essentially does the same thing: root privilege escalation. For a over the top explanation from a Microsoft guy to his usual audience this is good enough.
@bradenculver7457
@bradenculver7457 Ай бұрын
The fact a Microsoft engineer managed to notice his ssh connections were half a second longer than they should be and that’s the only reason this was caught is just truly incredible
@JodyBruchon
@JodyBruchon Ай бұрын
*The major thing that everyone misses when attacking open source for the failings of the "many eyes" argument is the success of the "many eyes."* This was caught because the backdoor caused a behavioral change that made someone notice it. One eye that didn't even know the code base which was infected blew the backdoor with years of presumably state-sponsored effort behind it completely out of the water.
@Schifty1988
@Schifty1988 Ай бұрын
if you are inserting a backdoor you would want to make it look like an innocent mistake
@user-cd5ki1ip3i
@user-cd5ki1ip3i 10 күн бұрын
@@Schifty1988 ....how do you manage to make introducing a back door a "mistake" ?
@Schifty1988
@Schifty1988 10 күн бұрын
@@user-cd5ki1ip3ithat is difficult! imagine you write code that enables you to perform SQL injection; this is a common programming mistake which would be spotted by a decent review; next imagine obfuscating that introduced vulnerability as some sort of optimization that does in fact look reasonable
@MrDimension0
@MrDimension0 2 ай бұрын
Since almost all closed source projects rely on some open source libraries open source vs closed doesn't matter. Fully understanding your supply chain is basically impossible nowadays. It's not only the software. Even the tiniest bits of hardware are manufactured from non-domestic companies accross the globe. There is an interesting recording of Bruce Schneier on this on youtube
@soulstenance
@soulstenance 2 ай бұрын
This is why copyleft licenses (GPL for example) are so vital! It forces companies like MS to, if they want to rely on such libraries, to make the _entire_ code base opensource as well. This is why projects like AOSP exist. We're kidding ourselves if we think Google makes Android opensource out of the kindness of their heart. They have no choice. 💁
@soulstenance
@soulstenance 2 ай бұрын
This is why copyleft licenses (GPL for example) are so vital! It forces companies like MS, if they want to rely on such libraries, to make the _entire_ code base opensource as well. This is why projects like AOSP exist. We're kidding ourselves if we think Google makes Android opensource out of the kindness of their heart. They have no choice. 💁
@Olgasys
@Olgasys 2 ай бұрын
@@soulstenance Once again, "rms" is right. XZ utils isn't GPL or LGPL, it is "public domain" which means ANY company can make changes to use their own code "enhancements". The same goes for any Apache licensed code which Android is licensed except the Linux kernel. I believe that is the part annoying Google so they are developing Fuschia.
@autistadolinux5336
@autistadolinux5336 2 ай бұрын
I actually share the opinion of one guy in a blog post: I AM NOT YOUR SUPPLIER. I posted the code on the internet because i want and not because of you. You want to use my code? Fine, close the source if necessary for your market, i posted there and if anyone wants to use whatever, but don't come @ me saying that "you need to fix this NOW" or "change that NOW", i will do it whenever i want to and if you want me to SUPPORT YOU, well... we can make a deal for commercial licensing and/or support. Seems fair to me.
@abarratt8869
@abarratt8869 2 ай бұрын
Absolutely. It’s amazing how often that gets forgotten. And in that sense, it’s difficult to say that the person who put this backdoor in did anything particularly criminal. They modified their source code and build system (ie they legitimately had access to all this). Other people copied it and used it. Ok, they were doing so out of malign intent; probably. Or it could have been a security flaw demo that simply got revealed too early (less likely). If one actually took it to court, it could be difficult to make a case stick. Probably one would have to go back to the campaign they launched to cajole the original maintainer into making them an admin, which might be construed as obtain goods and services by fraudulent means (uk ish legal language). But computer misuse? There’s no evidence that I’ve heard of that the backdoor has actually been used. What we don’t want is every flaw and mistake in OSS repos to become a reason to prosecute the maintainers. After all, what is the real difference between a blatant backdoor and a careless bit of programming? Nil.
@MikkoRantalainen
@MikkoRantalainen 2 ай бұрын
In fact, further investigation shows that this wasn't login without password but the actual backdoor (RCE) was even more complex. The backdoor allows blind command execution as root (that is, no return channel) and the command is encrypted as CA certificate in the handshake. If the CA certificate has some magic bytes set correctly, it will be decrypted with the public key in the backdoor and executed via system() API call. Nobody but the original attacker can create the encrypted content to be executed and nobody can check from the network traffic alone that the attacker has tried to pass a command because it would look like a regular ssh login attempt with non-authorized key and no extra TCP/IP packets sent in either way! Of course, ability to blindly run commands as root is typically enough to build a reverse connection from the attacked host to some other host controlled by the attacker (maybe another backdoored system) and get a return channel that way. However, your blind command could be something like "sleep 6000 && $build_reverse_connection" to disconnect the reverse connection attempt from the SSH connection attempt.
@spvillano
@spvillano Ай бұрын
Or worse, execute one's desired goals non-interactively, not forming the outbound connection at all until one's goal, say data exfiltration, is achieved. Now, one's only potential warning is the outbound - oh crap, data's already gone. Often enough, many are caught and halted by catching the bidirectional connection, regardless of which end initiated said connection. I've actually done it, captured the entire session in full packet captures, including the malicious software of the week, which was immediately submitted for inclusion in the IPS and antivirus and novel aspects of the attack fully documented and submitted to FBI intelligence, as it was a foreign nation-state actor and known APT. One such attack involved lateral spread that I'd gotten a sniff of, began packet capturing and captured an RDP session in progress, attacker opened notepad, did a buffer dump of binary data into notepad, saved it and used it to assemble their tools on the target system. Got not only their binary tool signature, but the latest PXE padding for their known tool. Outlined the remainder of their attack, then their session experienced a mysterious termination before the data that remained safe on the victim system could be exfiltrated... The system was then immediately isolated pending full file pulls and forensics. Two more attacks and we found their point of entry into the corporate, global network. One forgotten test server on one DMZ, prompting a full review on every DMZ in the corporate network. Yeah, as well received as the plague, but necessary after two golden ticket attacks, one of which was successful and boy, you don't want that kind of aggravation!
@LilRedDog
@LilRedDog 2 ай бұрын
I once asked Alex St. John, when he was writing for b00t, about Windows back doors and his answer was so vague I was convinced he was saying yes.
@DavesGarage
@DavesGarage 2 ай бұрын
He probably hedged for the same reason I would... none are known, but you can't prove a negative.
@hxhdfjifzirstc894
@hxhdfjifzirstc894 2 ай бұрын
@@DavesGarage You can't prove a negative *by hiding the source code.
@ronansan
@ronansan 2 ай бұрын
If the NSA has a National Security Letter forcing Microsoft to allow insertion of backdoors, it is also a felony for Microsoft to disclose this fact. This is why some projects have a "warrant canary" statement in their periodic disclosures. They say, "We have no state-mandated backdoors." Their position is that if they are ever forced to introduce a backdoor, they can remove the warrant canary statements from future disclosures without explicitly breaking the law, because they are not *telling* users that they have been forced to introduce backdoors; they are simply no longer telling users that they have not been forced to introduce backdoors.
@inpito
@inpito 2 ай бұрын
Microsoft doesn't need a back door, just use an Alternate Data Streams.
@haraldbackfisch1981
@haraldbackfisch1981 2 ай бұрын
@@inpito Microsoft IS the backdoor, no wait its just the door, no secrets here.
@sveticus
@sveticus 2 ай бұрын
It made the FPGA geek in me smile that Dave's Makefile example isn't even a C code Makefile. It's a Makefile for driving an FPGA design (on a Digilent Spartan-3 board) on the old Xilinx Project Navigator tools (from about 2011 or so).
@lukeskywalker2116
@lukeskywalker2116 2 ай бұрын
This is a victory for open source. If this were closed source, it would never be found.
@DavesGarage
@DavesGarage 2 ай бұрын
I can't agree, because (a) it was found through testing without the source (but diagnosed with source), and (b) it was found by a guy at Microsoft who was doing the type of testing that presumably Microsoft does on its own stuff. One hopes, anyway.
@emptylog933
@emptylog933 2 ай бұрын
Just not true. The benefit of open source is that it can easily adapted to fit your needs and those modifications can easily be shared. You can read and write assembled binaries in much the same way and people do all the time to find exploitable bugs or patch closed source software.
@dirlrido2522
@dirlrido2522 2 ай бұрын
@@DavesGarageThe majority of maintainers getting a bug report about a 500ms delay in a separate process from a single user would've probably considered it very low priority. Luck was definitely involved, but the fact that Microsoft engineer was able to check the source to diagnose the issue themselves is the reason this got fixed so quickly.
@AM-yk5yd
@AM-yk5yd 2 ай бұрын
​@@DavesGarage Just because you replaced word "found" with "diagnosed" doesn't change anything. It was found (not "diagnosed", Dave, "found") because developer had the access to the source code. To the complete source code, not the stuff that hosts on github (vs code says "hi"). Freund didn't "diagnose" that binaries were stored in tests folder, he "found" it. In the open source code. Don't replace word "found" because it breaks your ignorant narrative
@foobars3816
@foobars3816 2 ай бұрын
@@DavesGarage The guy found it during his easter holidays, when apparently he prefers running Linux for some reason.
@onkelfabs6408
@onkelfabs6408 2 ай бұрын
Don't forget that windows also runs openSSH
@LEVELMotorsports
@LEVELMotorsports 2 ай бұрын
MS17-010 was used by the NSA for countless years before it was found and patched. We still find instances of it today in unpatched old Windows systems. Old servers. ATM machines. Industrial systems. And on and on. That’s basically instant access to a SYSTEM level command prompt while only needing to have a systems IP address and being able to communicate with it over the network. Code review and process checks didn’t find that one.
@adammontgomery7980
@adammontgomery7980 2 ай бұрын
It sure helped me pass my ethical hacking course 😉
@DavesGarage
@DavesGarage 2 ай бұрын
Bugs aren't backdoors, though. I did not and do not claim closed source produced bug free code, so I think this is a strawman fallacy!
@EnigmaticCognition
@EnigmaticCognition 2 ай бұрын
Ms17-010/EternalBlue is not a backdoor; rather, it's an exploit that specifically targeted SMBv1 and weaponized it. The NSA did not inject the code responsible for the integer overflow and subsequent actions.
@EnigmaticCognition
@EnigmaticCognition 2 ай бұрын
Ms17-010/EternalBlue is not a backdoor; rather, it's an exploit that specifically targeted SMBv1 and weaponized it. The NSA did not inject the code responsible for the overflow and subsequent actions.
@cybertrk
@cybertrk 2 ай бұрын
@@DavesGarage the difference between a backdoor and a bug is intent. Hard to determine intent… who knows maybe that was malicious claimed ignorance.
@jeremiefaucher-goulet3365
@jeremiefaucher-goulet3365 2 ай бұрын
Since it never really went mainstream, it's easy to assume there are many other points where this could have been caught in downstream processes as well. As you say, it got caught early. Just because within an enterprise the process itself is hidden/internal instead of public, doesn't mean that the public process is inferior. Although yes, it sure brings more visibility than a private internal process. So you'd never hear about it in a private one.
@jackkraken3888
@jackkraken3888 2 ай бұрын
Probably not, at least not early evetually I thinkl so but as Dave said it had a really small number of devs working on it and the bad guy was already trying to get it included in the stable releases of Fedora and the like.
@stefan0206
@stefan0206 2 ай бұрын
No the public process isn't inferior. But it is by no means guaranteed (it isn't on closed software either). But a lot of people believe that open source software is inherently safe (because everyone can see the code). In practise it much more nuanced. As you say, its caught early this time. But what if that guy didn't dig in deep, or thought you know what I'll look at it after the weekend (and forgets about it). A lot of open source software is dependant on a small number of people and on the whole there are not many people that can do these kind of analysis, let alone make time for it.
@EmilioBPedrollo
@EmilioBPedrollo 2 ай бұрын
But it went mainstream. Arch Linux shipped it, as well as some other beta versions of other distros. Open source isn't as well scrutinized as one would think, the stage where it would most likely be cough was on the commit review, especially for a project that wasn't that popular. The issue is, project maintainers do it voluntarily, often a thankless and stressful job. Many develop mental health issues from those problems. And that is the main problem with open source.
@mortvald
@mortvald 2 ай бұрын
@@EmilioBPedrollo Arch Linux is a big offender with rolling releases, honestly if you don't live on the edge there are plenty of distro that stay behind one or two update cycles which is safe. keep in mind the other distro that use the latest updates are the reason such things get caught early, if you're not tech savy or you have sensitive info avoid such distros
@jeremiefaucher-goulet3365
@jeremiefaucher-goulet3365 2 ай бұрын
@@EmilioBPedrollo I disagree with your definition of mainstream. To me, mainstream would imply an LTS release of a commonly used distro. If you want to compare with betas and rolling releases, apples to apples, compare those with Windows betas and builds sent to public testers. I understand your skepticism, but you'd also be surprised how much more scrutiny is placed between what you describe and until it reaches Ubuntu LTS for example.
@daveys
@daveys 2 ай бұрын
Presumably that “sudden ending” thing means that more people watch up to the end of your video, so their “watched until” stats become better than if they recognise your outro and bail early.
@ChairmanKam
@ChairmanKam 2 ай бұрын
Except I am pretty sure Windows HAS been caught with backdoors. Apple didn't even password protect root too. Also, not sure I can believe the process checks for efficiency loss when Vista and 100 exist.
@spvillano
@spvillano Ай бұрын
Many Linux distributions don't password protect root. Without a password, root is then denied an interactive logon.
@nou712
@nou712 Ай бұрын
@@spvillano Locking the root account =/= no password.
@mattias3668
@mattias3668 2 ай бұрын
The changes to the makefile (or rather ./configure script which creates the makefile) wasn't even checked into source control, so most people wouldn't even see it, it was just included in the release file.
@__Brandon__
@__Brandon__ 2 ай бұрын
And if the makefile isn't under version control is it really open source
@stephanweinberger
@stephanweinberger 2 ай бұрын
So the main lesson to learn would be to always check out the repo and not just copy the tarball.
@spvillano
@spvillano Ай бұрын
@@stephanweinberger save that a trusted individual could as easily then generate a new hash for the Makefile, save it and it appears as valid as everything else in the repository. So, timestamp auditing would also be necessary, as its hash would be saved at a different time and date than the rest of the files. Well, unless that also was altered. My first rule of information assurance, trust no one, not even myself. So, stumbling blocks, such as checks and balances, auditing before publishing, etc always get inserted, regardless of my gonad pain. Never had a persistent compromise on networks I was in charge of, so I obviously did something right, given we were repeatedly targeted by multiple APT's.
@__Brandon__
@__Brandon__ Ай бұрын
@@spvillano we could all go sign the commits and gpg sign all build artifacts. That would be enough to ensure that atleast we are all using the same source code and that we know which key committed the code. Without gpg you can put anyone's name or email as a commit author to try to muddy the waters
@4Nanook
@4Nanook 2 ай бұрын
Actually it's not "in ssh", it's in libxzma, a library used by xz but also by systemd. In systems using systemd ONLY that patched ssh to tie it into sshd and THEN only of you have cutting edge distros that had this particular versions of the libxzma 5.6.x which are only used on very bleeding edge distros, Fedora Rawhide was alledged to be one of these but I have a Rawhide box and it did not have this version so that is bogus. Ubuntu, debian, mint, centos, most other mainstream distros are NOT affected.
@JonBrase
@JonBrase 2 ай бұрын
Your Rawhide box may just not have pulled the package in between when the update was put out and when it was pulled. It was RedHat themselves saying that all Rawhide boxes should be nuked to the ground.
@digus
@digus 2 ай бұрын
Thank you, came to say this. Claiming that it affects all of Linux is either misinformed or disingenuous.
@raidensama1511
@raidensama1511 2 ай бұрын
Umm. Ubuntu and Debian ARE affected!! But only their cutting-edge beta versions.
@CesarAugustoRL
@CesarAugustoRL 2 ай бұрын
​@@raidensama1511 exactly, the stable versions of Ubuntu, Fedora and Debian are not affected.
@JaneDoe-nl1vd
@JaneDoe-nl1vd 2 ай бұрын
We can't say stable versions are completely unaffected given the bad actor contributed over 700 commits to the project that go back years.
@ObiwanNekody
@ObiwanNekody 2 ай бұрын
I remember reading about a very early backdoor that was done by embedding the backdoor insertion insertion into the compiler, so when it compiled a compiler it inserted itself, and when it compiled a bit of password code it inserted a backdoor.
@five-toedslothbear4051
@five-toedslothbear4051 2 ай бұрын
To find that paper, search for Ken Thompson’s paper entitled Reflections on Trusting Trust
@WarrenGarabrandt
@WarrenGarabrandt 2 ай бұрын
There's an article called "Reflections on Trusting Trust" by Thompson, 1984, that touches on this idea of can you trust the compiler that compiles your compiler. Google for that title and it will come up dozens of times online. Anyway, it's an interesting thought about that.
@SaltyPuglord
@SaltyPuglord 2 ай бұрын
"Reflections On Trusting Trust" by Ken Thompson. Published in 1984. If anyone hasn't read it yet, now is the time...
@semiRockethr
@semiRockethr 2 ай бұрын
So the question is... does it still lives inside the compilers undetected because compiler needs compilation as well :p
@Jonno2020
@Jonno2020 2 ай бұрын
Yes, I remember this. This was early days when Linux came on scene, it was evolving and more eyes were getting involved in open source.
@Aberusugi
@Aberusugi 2 ай бұрын
The closed source equivalent is an exploit that no one caught being in MS Exhange Server for years, Microsoft discovering it, silently patching Office 362, but not releasing a patch for On-Premise Exchange for months and months until the prescheduled sales of stocks for the CEO go theough first.
@stevenbrudenell
@stevenbrudenell 2 ай бұрын
Dave missed a lot of the context of this backdoor (and of open-source in general). He seems to imply open-source software does not have tests or reviews, which... I mean, it does? In the liblzma case, the bad actor was making positive contributions to the project for YEARS. The previous liblzma maintainer was burned out, and yielded ownership of the project to the bad actor due to their contributions. They added the core backdoor code only after this. The liblzma backdoor is insane not just for because of how well it's hidden, but because it required a years-long campaign of espionage to install.
@DavesGarage
@DavesGarage 2 ай бұрын
Did not imply that. Specifically said I am not privy to the process. But if the process was as through as it should be, they would have caught this as a perf regression. But all that is in the video!
@ernestgalvan9037
@ernestgalvan9037 2 ай бұрын
…or what if was NOT a ‘years-long campaign of espionage’… What if the ‘bad actor’ was actually honest and good, but was suborned AFTER receiving ‘the keys to the kingdom’? Maybe he was blackmailed? Or bribed? Or ‘got an offer he couldn’t refuse’??? 🤔
@stevenbrudenell
@stevenbrudenell 2 ай бұрын
@@ernestgalvan9037 Hard to rule out. But the bad actor was laying groundwork for the backdoor since June/July 2023, which is a very long time for an account to be compromised without a "true" owner noticing or notifying someone.
@gfimadcat
@gfimadcat 2 ай бұрын
@@DavesGarage they wouldn't have because xz on it's own wouldn't have had a perf regression during testing. It doesn't get noticeable until sshd gets involved - but not the "official" openssh, only the patched versions that end up being done by distro maintainers to pull in systemd-notify support; so there's at least 2 levels of indirection before you even get to the point where it becomes a potentially detectable issue. And it was detected, and rectified.
@mibbio2148
@mibbio2148 2 ай бұрын
@@DavesGarage Liblzma has tests and a specific test file is even part of the way the backdoor is injected into the binary during the build process. One of the test files is an corrupted xz archive which contains obfuscated code for the backdoor. During build process the build script extracts this obfuscated code and adds it to the source to inject the backdoor into the binary. The developer even requested a change to Google's oss-fuzz to prevent the detection of the malicious code by this testing tools. Additionally he helped fixing a "bug" in Valgrind, which was caused by the backdoor. All of this was prepared bit by bit over several month.
@BummersAbound
@BummersAbound 2 ай бұрын
“Now a bit of my own backdoor stories.” Do tell Dave. Great stuff!
@phungyi4947
@phungyi4947 2 ай бұрын
Be careful! lol
@stevenchristenson2428
@stevenchristenson2428 2 ай бұрын
In regards to why was the changes not reviewed beforehand, the attacker had a cohort that became one of the maintainers of the project. This was needed for any of the binary code to be permitted to be merged with the main project. This was not a quick and dirty comit and took years to do because of them trying to wrestle away control of the project from the maintainer. This type of change in another project would have never succeeded because no other maintainer in there right mind would have comitted binary untested or reviewed code into their project. This is a very complicated story on how this even got past reviewers but its by no means typical or even possible in most cases... Some notes for correction here. The main exploit was not in source code format and was actually binary data. The attack code was actually in the testing stuff not in the main source code.
@julianelischer6961
@julianelischer6961 2 ай бұрын
Yes a binary was added but it is common in things like compression and encryption code to include TEST DATA that is encoded so that part of the test is to decode it. The bad code wasn't even obvious in the decoded version. The hack literally snipped bits and pieces of it to assemble the bad code from innocent parts.. I have seen test data include things like tar files and further encrypted files (to test effectiveness of compressing compressed data etc.) so it is not as hard to understand how this binary test data got in.
@arthurmoore9488
@arthurmoore9488 2 ай бұрын
@@julianelischer6961 Dave highlighted exactly why raw Makefiles are terrible. They're a mess and a nightmare to audit. Which is what let the attacker kick the whole thing off. Unfortunately, there's a large number of developers who haven't moved past the 90s, and think C with Makefiles is the ultimate end all be all.
@omertaprimal6913
@omertaprimal6913 7 күн бұрын
One of the most informative channels on the internet. Thank you!
@user-tw2kr6hg4r
@user-tw2kr6hg4r 2 ай бұрын
The xz utils project is independent from Linux. The team behind xz was tiny and thus was easy to exploit. The root of the problem in my opinion is the blind trust that was put into such a project. The issue is related to the distributions (Fedora Rawhide, Debian Sid, Archlinux, ...) which didn't spot the glaring security nightmare in packaging a library with only two active maintainers. (To be fair, Rawhide & Sid are unstable releases and the backdoor didn't work on Arch)
@DavesGarage
@DavesGarage 2 ай бұрын
"But it's not in Linux! Just in the repos!" How do you get Linux installed? "Install one of the repos!" So you can see why this argument is not that compelling...
@ecavero1
@ecavero1 2 ай бұрын
The attacker started earning the other maintainer's trust over the years, until he finally took over the project. It is believed he created other Github users to put pressure on the maintainers of those distributions to include the newer versions of xz-utils into the repos. Also, most open source projects (like this one) are done as a hobby or just for the love of contributing to open source!
@mc-not_escher
@mc-not_escher 2 ай бұрын
@@DavesGarage…or, you know, just compile from stable/LTS. Sure, you live and die by the sword, but I don’t know of anyone or any company much less that would willingly run their production on bleeding edge software save for devs on VMs to claim a paycheck. It’s sad to see people conflating bugs and backdoors here in the comments. 🫤
@warthog618
@warthog618 2 ай бұрын
@@DavesGarageYou mean distros, right?
@__Brandon__
@__Brandon__ 2 ай бұрын
Close source applications use open source libraries. In fact they use the same libraries that macos, android, and linux use. So by this logic window is android. Widows is macos. And windows is linux. Is very bad logic indeed
@agooodolecoder
@agooodolecoder 2 ай бұрын
hmm the script (m4?) that injected the malicous object code into the build process wasnt checked into git, but was only added to the sourcecode tarball that the maintainers provided?
@elta6241
@elta6241 2 ай бұрын
That’s the way. Keep it out of the repo but inserted into the release.
@The_Boctor
@The_Boctor 2 ай бұрын
Do you think that GitHub should remove the ability to do "hot" changes to existing releases like that? Not asking a rhetorical, I personally dislike that feature because of things like this. A program called MilkyTracker was also broken on a few distros last year, because someone working on it changed a release without incrementing the version or anything. As a result, packagers didn't know there was an update!
@Benkaboi
@Benkaboi 2 ай бұрын
Open source: the backdoor is there until it is found and closed. Closed source: the backdoor(s) are there as long as the developer or the authority wants it to.
@AM-yk5yd
@AM-yk5yd 2 ай бұрын
Or somebody having expensive decompilers(IDA costs a lot, there are also free tools ghidra and radare, but they are not so good). Here it was telling that Freund is "not a security researcher, nor a reverse engineer."
@paulantoine1696
@paulantoine1696 2 ай бұрын
It seems very likely to have been a state-based long term exploit, given the social engineering and span of effort. No company on the planet is immune from state-based attacks either... so it's not a specific open source issue really.
@rs.matr1x
@rs.matr1x Ай бұрын
how many state sponsored backdoors have been baked into CPU chips and closed source software? operation rubicon went on for years. China (im guessing) probably planned this back door for years and got caught.
@Munenushi
@Munenushi Ай бұрын
@@rs.matr1x Bvp47 was in Linux for 10 years (even after being submitted to "Virustotal" in 2013)...
@CalumMacKinnon1
@CalumMacKinnon1 2 ай бұрын
In the mean time and inbetween time, hope to see you next time Dave 😊
@mandrildev
@mandrildev 2 ай бұрын
The difference is that it was detected and fixed. In closed source the NSA or any other agency can tell Microsoft to add a backdoor and nobody would ever notice it.
@tofu_golem
@tofu_golem 2 ай бұрын
Doesn't Windows 11 use the same TZ code?
@v1o
@v1o 2 ай бұрын
You forget the angle about state actors being involved. Even someone working at Microsoft could be an agent.
@spvillano
@spvillano Ай бұрын
Probably is, the trick is sufficient cross checking and auditing to try to trip that up. The biggest plus in open source is, tens of thousands of eyes on all of the code. Maybe George didn't spot the makefile change, but Bob had an odd command he needed plugged in to compile the thing for his specific needs and ran into the unauthorized change. Bob asks about it, none of the devs know what's going on and start prying, then the lid pops off of that jar. All for free, whereas in closed source, all have to be paid, so are lesser in numbers or odd one-off cases that would cause them to go into a makefile. Welcome to engineering 101, where everything is a tradeoff. You've taken your first baby step into adulthood. Beware, there be dragons! No, that wasn't a dragon, I'm just not used to eating beans that much anymore... Sorry!
@Munenushi
@Munenushi Ай бұрын
@@spvillano Bvp47 was in Linux for 10 years (even after being submitted to "Virustotal" in 2013)...
@zombi1034
@zombi1034 2 ай бұрын
Very considerate of that hacker to make sure only they can backdoor in my computer. This would have been a disaster if anyone could have used that backdoor😂
@foobars3816
@foobars3816 2 ай бұрын
Well actually, you may be joking, but you're not wrong.
@dreamyrhodes
@dreamyrhodes 2 ай бұрын
The real bug here was that a single maintainer does run a project, that core elements of our infrastructure depends on, entirely on his own, on the wedge to a burnout, completely unpaid. That is similar to the Java bug (Log4J). The bug here is not open source, the bug is in the system that essential open source projects are not paid for. Economy depends on it, national security depends on it. And even more so if the attack with its chain of heavy social engineering was performed by an intelligence service of a foreign state. The real lesson from this incident should be, that states should take tax money to support open source projects more.
@AM-yk5yd
@AM-yk5yd 2 ай бұрын
Log4j was not a bug, it was a "feature". Java strings by themselves do not go ringing the internet. Log4j intentionally made JDNI support. I don't see how paying for the work would have prevented either case. "Jia Tan" definitely wouldn't be like "I am being paid for xz, I should quit stop being a state actor on a fat payroll" Log4j developers(who made the feature) definitely wouldn't be "maybe we need less features?". If anything it'll be opposite: more bloat.
@dreamyrhodes
@dreamyrhodes 2 ай бұрын
@@AM-yk5yd It's not about Jia Tan, it's about the xz maintainer. Jia Tan got through because he was able to exploit the situation of a single maintainer being on the wedge of a burnout. Jia Tan probably already was on the fat payroll of an intelligence service. He's the one getting paid for infiltrating, the maintainer is not getting paid.
@AM-yk5yd
@AM-yk5yd 2 ай бұрын
@@dreamyrhodes anyone with an actual working experience can tell you that burnout does not magically disappear because there are money, so this point is moot. The moment project would be looking for other developers would be a point bad actor intervene. And most likely would look better than other candidates - even because why i say "he" there is no reason to believe even now he was a lone wolf without team. If you not even for a minute think on how bad actors would behave if it situation was different, you are not thinking enough and propose solutions no more effective than asking "are you over 18"on lewdy sites.
@JamieStuff
@JamieStuff 2 ай бұрын
The issue with closed source is that we can never know if someone in upper management got a visit from someone in a nice suit wearing sunglasses wanted a specific undocumented "feature" put into the software. At least with open source, it can be investigated.
@DavesGarage
@DavesGarage 2 ай бұрын
It would require a conspiracy amongst multiple people at a couple levels, and if you're willing to set those as a criteria, than Linux could be subverted in the same way, I'd bet. But again, since I don't know what the checks and balances are, I don't speculate.
@elta6241
@elta6241 2 ай бұрын
@@DavesGarage This tells us otherwise. The techniques used here can easily be used internally in an organisation. I immediately get suspicious when people use the word ‘conspiracy’.
@JonBrase
@JonBrase 2 ай бұрын
​@@DavesGarageThe only "conspiracy" needed is for the source code to the component in question to be under NDA, with anyone who signs the NDA being told "this backdoor was required by the feds, if you talk about it you can expect a visit from the FBI". Given the likely actor in this case, however (mainland China) an attack they made on western versions of Windows would likely be conducted in a similar manner (social engineering / corporate espionage leading to a supply chain attack on/through middleware), since they don't have direct jurisdiction over companies headquartered in Redmond.
@xXx_Regulus_xXx
@xXx_Regulus_xXx 2 ай бұрын
@@elta6241 people with a corporate mindset (no offense, Dave!) are almost as a rule predisposed to not wanting to think about under-the-table dealings, even though every government has a body of people whose day jobs consist of precisely that. I'm not sure what the Canadian equivalent of the NSA would be, but I don't think I have to explain in a comment section under a tech channel what the problems they pose for software development would be.
@theodis8134
@theodis8134 2 ай бұрын
@@DavesGarage If it's open source then it's going to need to be subtle or obfuscated or it will risk being spotted. If it's closed source it can be a lot less subtle. Even if you assume most governments wouldn't do this. There's a reason Germany and the US are advising against using Kaspersky products due to what's going on with Russia. And a similar thing with Huawei and China.
@IulianNicuSerbanoiu
@IulianNicuSerbanoiu 2 ай бұрын
Very important note: the code was NOT checked in. The problem is the fact that the release package was crafted with makefiles and other scripts. So this was clearly a bad intention. The only thing checked in were the compressed files (binary files - hard to review, especially since they were used in tests) containing the rogue scripts inside of them. Without the custom scripts and makefile from the crafted release package they were pretty much useless. So those changes in makefile and scripts were made outside the git source control.
@user-qm4ev6jb7d
@user-qm4ev6jb7d 2 ай бұрын
And even worse, the files in question are specifically *corrupted* compressed files (corrupted by design, as they are supposed to be test cases). That means, the file can't even be inspected as is. To inspect it, one would have to read those very obfuscated scripts which un-corrupt the files before unzipping them.
@krakenbinary2051
@krakenbinary2051 2 ай бұрын
I like the quick stop... Thanks for trying something new!
@johncnorris
@johncnorris 2 ай бұрын
Nice review of the issue. PS - What do you know about the BSOD? Did you have anything to do with that?
@eval_is_evil
@eval_is_evil 2 ай бұрын
Denying any connection outside of a specific subnet within sshd_config or host.allow/host.deny doesn't mitigate the backdoor? Edit: it does
@Sa1985Mr
@Sa1985Mr 2 ай бұрын
Yes, it would mitigate this vulnerability to only allow listed hosts.
@eval_is_evil
@eval_is_evil 2 ай бұрын
​@@Sa1985Mr so essentially this isnt a problem, never knew an organization that would just leave ssh open. But then again I still see them use telnet ffs.
@meggrobi
@meggrobi 2 ай бұрын
The thing is it was found because it was open source, close source is mystery and or minefield.
@benjaminlynch9958
@benjaminlynch9958 2 ай бұрын
That’s not true. As Dave mentions in the video, the attack code isn’t actually in the source code. It’s in a precompiled binary. And it was caught not in some open source code review, but through plain old benchmarking. The CPU was pinned at 100% for a trivial task, and the benchmark reviewer started asking questions because it didn’t make sense. If the attacker hadn’t got careless and instead limited CPU cycles or network traffic to something resembling ‘normal’ activity (say 10%), this likely wouldn’t have ever been caught despite being open source.
@meggrobi
@meggrobi 2 ай бұрын
@@benjaminlynch9958 sure it was hidden, that's was the point. It would have never been trace to the hacked binaries without OS. It shows nothing is infallible. In closed source like MS may find a rogue independent programmer but we will never known if it management approved backdoor.
@theodis8134
@theodis8134 2 ай бұрын
@@benjaminlynch9958If it wasn't open source the engineer wouldn't really be able to see why ssh was causing so much CPU use. He would have only been able to file a bug report likely to ssh which isn't even the root of the issue. So someone working on the ssh package would have to get the bug report and diagnose the issue, but if systemd and xz-utils were also closed source those devs couldn't do anything but forward the issue. Now even if the issue managed to make it to the proper maintainer, he's one guy and he's burnt out on the project so there's always the chance that he can't figure it out easily or promptly. It is kind of nice that the engineer who knew what he was doing could follow the chain on his own without hitting roadblocks due to proprietary black boxes.
@dm-vh3xj
@dm-vh3xj 2 ай бұрын
​@@theodis8134 It's easy to detect the cause of high CPU usage in Windows by using Sysinternals Process Explorer connected to MS public symbol server.
@IMBlakeley
@IMBlakeley 2 ай бұрын
It was pure chance that a developer working on another database project noticed a discrepancy in connect times via ssh after an update.
@Finnisher_DAD
@Finnisher_DAD 2 ай бұрын
Another interesting video and I have to say your little cuts are just perfect, lols!
@stevepriority4219
@stevepriority4219 2 ай бұрын
Dave, your quick ending worked. Your latest video finally appeared in my youtube feed, not some 2 year old video like I normally see.
@PeterBuvik
@PeterBuvik 2 ай бұрын
The damage wasn't really that bad since most people doesn't use Debian Sid It would have been much worse if it were in the Debian Release repo or if Ubunto had actually shipped it.
@johansvideor
@johansvideor 2 ай бұрын
This has implications for all Open Source, not just Linux. A colleague got this backdoor on his Mac computer! An upgrade did update the offending libxzma component, though. Did you know that a lot of open source software is used also in Windows? It could have happened to another component as well.
@etherweb6796
@etherweb6796 2 ай бұрын
These sorts of things always get called "Linux" problems - pretty sure this would be possible on BSDs using OpenSSH as well
@lastfm4477
@lastfm4477 2 ай бұрын
@@etherweb6796 Nope! systemd does not exist on BSD's. Thank god.
@oasntet
@oasntet 2 ай бұрын
Your colleague must have put in a lot of effort to get this backdoor into his Mac, considering how few linux distros adopted the change. I mean, it popped up in the nobody-should-be-using-this testing release of Debian, and some really bad timing from Manjaro got it in there, but the number of actually compromised linux systems was probably a few dozen.
@Munenushi
@Munenushi Ай бұрын
@@oasntet Bvp47 was in Linux for 10 years (even after being submitted to "Virustotal" in 2013)...
@oasntet
@oasntet Ай бұрын
@@Munenushi BVP47 was not _in_ Linux. It never shipped with a linux distro, because it is a rootkit (not a backdoor) that needs to be installed via some other vulnerability. When Pangu found it, it was notable not because it was there in plain sight for ten years, but because they finally found it in the wild and also identified the parties responsible.
@amadensor
@amadensor 2 ай бұрын
For a very long time, it was possible to send a specifically crafted path to SMB and alter files you normally couldn't. Not really sure if it was a deliberate or accidental back door.
@ryd3v
@ryd3v 2 ай бұрын
Maybe this is a dumb question, but doesn't ssh have to be running, and your network allow inbound ssh connections for it to work? So for example if you had Fedora with ssh blocked on the device and network level, you'd be safe right?
@justin423
@justin423 2 ай бұрын
Google xkcd Nebraska. That comic was dead on
@9072997
@9072997 2 ай бұрын
"With something like Windows NT, you don't just check in code and wait for it to show up in the build" That's an interesting comment coming from the guy who accidentally gave us the 32G FAT limit.
@DavesGarage
@DavesGarage 2 ай бұрын
Good point. That was kind of the wild west. Still, I'm not sure I'd change that by the way, and they haven't seen fit to either, so I could argue it was the right choice :-)
@thomasmaughan4798
@thomasmaughan4798 2 ай бұрын
@@DavesGarage The FAT (File Allocation Table) design is brilliant; extremely efficient and even possible to manually fix some problems in the case of cross-linked files. This was at a time when a "full gallon" computer had 64 kilobytes of RAM and the operating system needed to function in about 16 kilobytes or less. Anyway, this is why many embedded systems such as my oscilloscope still use FAT formatted USB storage. It is simple and efficient (and the patent expired! Anyone can use it; it is nearly universal).
@spvillano
@spvillano Ай бұрын
@@thomasmaughan4798 and fun for a joke. First FAT Table Corrupted. Wanna Try The Skinny One?
@thomasmaughan4798
@thomasmaughan4798 Ай бұрын
@@spvillano "First FAT Table Corrupted" While a frequent occurrence, it was also fairly easy to manually fix. Of course, by then one of the cross-linked files was demolished but you could decide which one to keep.
@LondonSteveLee
@LondonSteveLee 2 ай бұрын
It was an innocuous looking test file as part of the make package that contained the payload.
@RegisBodnar
@RegisBodnar 2 ай бұрын
This kind of video is the reason I watch your content, even though I'd abandoned Windows long ago, in favor of the Penguin OS! Keep up the good work!
@forzatoro89
@forzatoro89 2 ай бұрын
How backdoors are inserted in windows: - NSA asks to Microsoft - done
@spaceguybob
@spaceguybob 2 ай бұрын
So true, and we would never know
@bokkenka
@bokkenka 2 ай бұрын
AH! THERE'S A BACKDOOR THAT CAN TAKE OVER ANY LINUX COMPUTER IN THE WORLD!!!! (as long as it's running the very latest version of SSH, which it most likely isn't, and definitely better not be if it's a production server.)
@AM-yk5yd
@AM-yk5yd 2 ай бұрын
Once a liar, always a liar. Dave (and his company) literally admitted "making false claims that the computer is at risk" in the court among other things. That was not the only thing, but I'm not going to test if he blacklisted keywords related to his heroic deeds, just google quoted text (include quotes) or his name on hackernews or reddit. I'm not even sure Hanlon's razor is applicable to this video.
@kevingarand1426
@kevingarand1426 2 ай бұрын
you may or may not have done a video on this, but what is your sense of Open Source vs. Closed Source? With your experience at MS, is it really safe, and the rumors you hear about back doors and bad code, etc true or just that rumor. Basically is Windows safer than Linux? or.. Good video, thanks for explaining.
@iAPX432
@iAPX432 3 күн бұрын
There was backdoor in Windows for the NSA, but they weren't maliciously injected, they were parts of the specifications.
@JibunnoKage-cj2kz
@JibunnoKage-cj2kz 2 ай бұрын
The title of this video completely cracked me up! "When Penguins Cry" As a cross platform animal... supporting SBCs, Windows, Linux, and various type-1 hypervisors... I am routinely surprised how people believe false truths of the various platforms.... no platform is 'safe' in context to all threats. This issue and how it happened should be take as a major wake up call. On par with key CVEs that appeared in various type-1 hypervisors, which I was doing infrastructure/enterprise design for a fortunate 10... before I retired in 2018. The CVEs being found was one thing, but what we knew was possible, probable, existing as zero-day exploits would freak out the public, if they had any true understanding of the risks! Any malware being found, has an element of luck!
@javabeanz8549
@javabeanz8549 2 ай бұрын
Not to mention that IP accessable boards are in many servers, and some of those have holes you can drive trucks through.
@JibunnoKage-cj2kz
@JibunnoKage-cj2kz 2 ай бұрын
@@javabeanz8549 Yes, Dell iDRAC for example, had some major issues early on, as did HP iLO did in its initial variants. This is why the such 'lights out' access methods of servers has to always be (recommended) on an 'administrative' rail that is highly audited/monitored, just as access to VM management infrastructure (now) is.
@darkprinc979
@darkprinc979 2 ай бұрын
And just think, even our cars are getting connected now. Isn't it great?
@javabeanz8549
@javabeanz8549 2 ай бұрын
@@darkprinc979 not only are they connected, they are becoming tattletales... soon the cars will be able to check the speed limit of the zone you are in, and prevent you from exceeding that limit by more than ten miles per hour, and the cops will be able to just shut off your car, so you can't run from them. So what happens when criminals figure out how to hijack these "features?"
@darkprinc979
@darkprinc979 2 ай бұрын
@@javabeanz8549 Don't forget "anti-drunk driving measures". I'm sure nothing could possibly go wrong with all of these "safety" features. Oh, and what happens when big brother doesn't like the opinions you've been expressing on the internet?
@RolandGustafsson
@RolandGustafsson 2 ай бұрын
I would argue that the makefile deserves as much scrutiny as the source code because it *is* source code!
@mithrandirthegrey7644
@mithrandirthegrey7644 2 ай бұрын
Nobody reads that shit and you know it. If it compiles, move on with your life.
@jack6539
@jack6539 2 ай бұрын
absolutely. I have always treated makefiles and build scripts as source code - using the same rigour used for the code itself. The same applies to everything used in the build process - build systems should be rebuilt from the asset/version control repositories regularly. Of course, many devops teams have a view that they don't have to eat their own dogfood, but they are very very wrong. I gues thats the main difference between devops and SCM (remember that?)
@RolandGustafsson
@RolandGustafsson 2 ай бұрын
@@mithrandirthegrey7644 then they shouldn’t be in charge of vetting code changes.
@MartinFrancisEcclesiact
@MartinFrancisEcclesiact 2 ай бұрын
Well I'll bet they'll start now.
@BrotherCheng
@BrotherCheng 2 ай бұрын
This video missed the fact that the malicious build scripts that injected the malicious code only exists in the release tarball, not the Git source. This is why you would not see it if you just browse the source code itself. What we need to do is to have a reproducible way to generate the release tarballs and have those be checked routinely and automatically to verify that they match the source code. This is harder to do for binary releases (since you need reproducible builds) but for release tarballs for source code it should definitely be done.
@tpaine666
@tpaine666 2 ай бұрын
Loved the content, hated the exit! Keep up the good work...
@henrymach
@henrymach 2 ай бұрын
Now imagine how many of those backdoors exist on closed software and nobody will ever discover them exactly because it's closed source
@danielcoffman1022
@danielcoffman1022 2 ай бұрын
I think the point is that the back door was found and removed…because it was open source. The vulnerability was with some code in one package that wasn’t everywhere. Microsoft has backdoors that are still there to this day…we ALL know this.
@__Brandon__
@__Brandon__ 2 ай бұрын
And don't forget closed source projects heavily depend on open source projects. They are equally exposed
@WhiteError37
@WhiteError37 2 ай бұрын
Didn't make it into build and not many if any big businesses use the latest and greatest. They are all most likely on stable but yeah this is pretty dam nuts. Someone put a back door into the make build script!
@tylerdean980
@tylerdean980 2 ай бұрын
This didn't even affect Arch Linux, one of the most up to date distros
@tymondabrowski12
@tymondabrowski12 2 ай бұрын
And I think that make build script wasn't even on the repo. So no commit. Afaict.
@Cyber_Homestead
@Cyber_Homestead 10 күн бұрын
LOL! I like how this video was actually abruptly ended.
@HairyHands
@HairyHands 14 күн бұрын
did you already do a video about why no new version of Windows can have a folder named CON if not .... pretty please? :)
@yclept9
@yclept9 2 ай бұрын
For the ultimate vulnerability see Ken Thompson's Turing Lecture "On Trusting Trust," for why reading the source code doesn't help.
@SaltyPuglord
@SaltyPuglord 2 ай бұрын
You and LowLevelLearning have both earned my sub this week. Thanks to both of you for being awesome.
@carloschu7127
@carloschu7127 21 күн бұрын
Increidible. I am start to learn cibersecurity recently, and first thing beign told, if something takes longer than normal, we should start to check, if the system beign hacked.
@dkaustin98
@dkaustin98 16 күн бұрын
I have worked in computer support since the early CTOS days. I have seen a lot. I do remember at time when we were installing Windows OS from 3.5 inch discs. Discs that came sealed in plastic wrappers. It was standard procedure to check the discs for a virus before installation. In this batch of 50 computers, every pack of Windows OS discs we opened were infected. After that we went to disk imaging from a safe source. So, somethings do get through.
@gaborszarka7596
@gaborszarka7596 2 ай бұрын
let me summarize your thoughts: implications are catastrophic - only bleeding edge unstable distros are affected discovered only by accident - but very quickly in a package few people are caring about backdoor with private key access gives ultimate access to any linux system, obfuscated as test data, uses its own state machine for injection - it could have been easily engineered to not peak cpu usage during BVT hacker used years of social engineering to develop trust in the community - same vulnerability is there in closed source code
@AndrewErwin73
@AndrewErwin73 2 ай бұрын
Technically, no... not ANY system. It is specific to sshd. And, it didn't affect all distros.
@HarkoretoDaBone-nf7ff
@HarkoretoDaBone-nf7ff 2 ай бұрын
7:55 when you mentioned working on MS DOS 6.2, it brought back lots of childhood memories for me when I first got into personal computing. I remember playing around with autoexec, config.sys and Double Space. Learnt it just to play games.
@jonathandawson3091
@jonathandawson3091 2 ай бұрын
You're wrong actually, the vulnerability was not to ssh into any computer, but to get remote root command execution on any computer serving sshd. The command that can be run has to be small, part of the handshake payload.
@JannisAdmek
@JannisAdmek 2 ай бұрын
7:25 For anyone who is wondering: Linus is the maintainer of the Linux Kernel (which is called Linux after him). "Linux" as in one of the Desktop/Server OS "distributions" is a different project. Debian for instance is an OG Linux-based OS or Linux Distribution (or GNU+Linux distribution). They bundle a bunch of software together with the Kernel to produce a full operating system, like a boot-loader, the init-system systemd, POSIX utilities, graphical desktop..., and also OpenSSH and xz. xz is a compression library but the exploit targets sshd.
@IsYitzach
@IsYitzach 2 ай бұрын
I don't know if 500 ms counts as a "lot longer."
@phizc
@phizc 2 ай бұрын
It is when it went from less than 300ms.
@vast634
@vast634 2 ай бұрын
In gaming 500ms per frame would mean you only get 2 FPS. Thats very noticeable.
@simpleprogrammingcodes3834
@simpleprogrammingcodes3834 2 ай бұрын
At least in open source a backdoor has a chance to be detected because people can see the make files and the build process and investigate. In closed source all the make files and build process are hidden so the user has no chance of knowing if a slowdown is because of the backdoor or something else.
@aldob5681
@aldob5681 Ай бұрын
Tried very hard to acces my sbc remotely and this guy managed to to it without asking . Clever
@markdeckard7651
@markdeckard7651 2 ай бұрын
This is why I stick to Windows. All that sweet, sweet telemetry and data collection. When the entire OS is malware, you don't have to worry about malware!
@johnkeck
@johnkeck 2 ай бұрын
Lol
@BlueEyedVibeChecker
@BlueEyedVibeChecker Ай бұрын
As an Android user, same.
@sto3359
@sto3359 2 ай бұрын
Sweet ending!
@arightscepter
@arightscepter 2 ай бұрын
First time seeing you. Hard to ignore how bright you are, but that's fine, Most impressed that you are a fantastic speaker/communicator. Also after learning nothing really concrete I could describe, I feel like I know twice what I knew about computers previously.
@GerhardMack
@GerhardMack 2 күн бұрын
Missing from this discussion is just how often closed source companies use open source libraries.
@doug-zilla
@doug-zilla 2 ай бұрын
What about all the data Microsoft is collecting from you via your Windows pc and Microsoft apps like Outlook? I'm planning on switching to a Linux desktop just to reduce that information flow.
@werethless12
@werethless12 2 ай бұрын
He made tens of millions off that. He loves Microsoft.
@jub8891
@jub8891 2 ай бұрын
We just pretend that doesnt exist
2 ай бұрын
You don't have to use Windows or Outlook then. There are alternatives.
@LyleAshbaugh
@LyleAshbaugh 2 ай бұрын
I think he left Microsoft before any of that
@AM-yk5yd
@AM-yk5yd 2 ай бұрын
Do it. Honestly before windows 11 I would say that windows was better for the user simply because it had consistent UI for the settings. Now honestly I feel more consistency with KDE than with windows (also new settings menu in windows is bad).
@TokkanFX
@TokkanFX 2 ай бұрын
I'm sure the screen should have gone black apart from a white dot at the end there Dave.
@BeheadedKamikaze
@BeheadedKamikaze 2 ай бұрын
Aw you worked on MS-DOS 6.2? That was my favourite version ☺ Thanks for the info and the great presentation style
@gm2407
@gm2407 Ай бұрын
Microsoft is actually a major contributer to Linux as well so it doesn't surprise me that a Microsoft employee noticed something unexpected with it.
EXPOSED: The Windows Rootkit Scandal by Sony
20:47
Dave's Garage
Рет қаралды 394 М.
Want High Speed Fiber?  Watch this First!
18:52
Dave's Garage
Рет қаралды 318 М.
В ДЕТСТВЕ СТРОИШЬ ДОМ ПОД СТОЛОМ
00:17
SIDELNIKOVVV
Рет қаралды 3,8 МЛН
WHO DO I LOVE MOST?
00:22
dednahype
Рет қаралды 19 МЛН
Stupid Barry Find Mellstroy in Escape From Prison Challenge
00:29
Garri Creative
Рет қаралды 6 МЛН
New MIT Discovery Just Solved Water's BIGGEST Mystery!
11:33
Two Bit da Vinci
Рет қаралды 962 М.
What Everyone Missed About The Linux Hack
20:24
Theo - t3․gg
Рет қаралды 279 М.
MUST KNOW bashrc customizations to boost productivity in Linux
13:38
DNS Demystified: Everything You Should Know for Faster Internet!
14:03
Ranking Linux Distributions for 2024: a tier list for my use case !
20:35
The Linux Experiment
Рет қаралды 450 М.
Why are Bluescreens Blue?
16:27
Dave's Garage
Рет қаралды 914 М.
Everything you SHOULD know about your Computer but don't!
19:59
Dave's Garage
Рет қаралды 443 М.
The Making of Linux: The World's First Open-Source Operating System
11:33
ForrestKnight
Рет қаралды 1,2 МЛН
Docker vs VM:  What's the Difference, and Why You Care!
13:40
Dave's Garage
Рет қаралды 242 М.
Урна с айфонами!
0:30
По ту сторону Гугла
Рет қаралды 6 МЛН
TOP-18 ФИШЕК iOS 18
17:09
Wylsacom
Рет қаралды 646 М.
📦Он вам не медведь! Обзор FlyingBear S1
18:26
МОЩНЕЕ ТВОЕГО ПК - iPad Pro M4 (feat. Brickspacer)
28:01
ЗЕ МАККЕРС
Рет қаралды 70 М.