Hírolvasó
Új verzió érhető el a ClamAV antivírus szoftverhez
A ClamAV antivírust használók számára fontos információ, hogy a biztonsági szoftver 0.105 és 0.104-es verziói támogatási életciklusuk végéhez értek (EOL) így a továbbiakban nem kapnak gyártói frissítést, ezért a szoftvert használók számára javasolt átállni a legfrissebb 1.1.1-es verzióra.
The post Új verzió érhető el a ClamAV antivírus szoftverhez first appeared on Nemzeti Kibervédelmi Intézet.
Game of Trees 0.92 released
Version 0.92 of Game of Trees has been released (and the port updated):
* got 0.92; 2023-08-29 see git repository history for per-change authorship information - allow modified files to be deleted during merges if content exists in repo - disallow overlapping repo and work tree in 'got checkout' - speed up opening of the work tree's file-index - speed up deltification by resizing block hash tables less often - add support for commit keywords to 'got log -x' - fix 'got log -dPp' diffstat duplication bug - improve out-of-date reporting accuracy in 'got branch -l' output - document that the log -d option implies log -P - prevent file-index corruption via deletion of missing locally-added files - prevent a double-free in got_worktree_commit - fix regression from 0.76: 'got diff' output matches /usr/bin/diff -p again - gotsh: do not set POLLOUT flag if there is no data to send, for portability - gotd: stop logging "unexpected end of file" when client decides to disconnect - make gotd flush pending messages before disconnecting the client upon success - gotwebd: fix bogus modification times displayed when show_repo_age is off - tog: show work tree base commit marker in the log view - tog: fix an infinite loop that could be triggered via log view search - plug a memory leak in tog's blame view - tog regress: prevent crash in ncurses when Ctrl-C is used to cancel test runs - tog regress: fix occasional failures due to commit timestamp mismatch - regress: nix 'set -A' kshism from tests for portability[$] Python is (mostly) made of syntactic sugar
Security updates for Tuesday
Rest in peace Satoru Ueda
Közel feleződött az átlagos „lappangási idő” a ransomware támadások során
A Sophos friss jelentése szerint a ransomware támadások esetében tavalyhoz képest csökkent az átlagos „dwell time”, az az időablak, amit a támadók a kompromittált hálózaton tudnak tölteni amíg le nem lepleződnek. A jelentés arra is felhívja a figyelmet, hogy a hackerek az RDP szolgáltatást is rendkívül gyakran használják ki a támadások során.
The post Közel feleződött az átlagos „lappangási idő” a ransomware támadások során first appeared on Nemzeti Kibervédelmi Intézet.
10 millió érintettje van a francia munkaügyi központot ért adatszivárgásnak
A Pôle emploi sajtóközeménye szerint Franciaország munkanélküli hivatalánál kibertámadás történt, ami több millió francia állampolgár adatainak kiszivárgásához vezetett. Az incidens során feltételezhetően a MOVEit fájlcserélő sebezhetősége is szerepet játszott.
The post 10 millió érintettje van a francia munkaügyi központot ért adatszivárgásnak first appeared on Nemzeti Kibervédelmi Intézet.
Matthew Garrett: Unix sockets, Cygwin, SSH agents, and sadness
Git for Windows is built on top of msys2, which in turn is built on top of Cygwin. This is an astonishing artifact that allows you to build roughly unmodified POSIXish code on top of Windows, despite the terrible impedance mismatches inherent in this. One is that until 2017, Windows had no native support for Unix sockets. That's kind of a big deal for compatibility purposes, so Cygwin worked around it. It's, uh, kind of awful. If you're not a Cygwin/msys app but you want to implement a socket they can communicate with, you need to implement this undocumented protocol yourself. This isn't impossible, but ugh.
But going to all this trouble helps you avoid another problem! The Microsoft version of OpenSSH ships an SSH agent that doesn't use Unix sockets, but uses a named pipe instead. So if you want to communicate between Cygwinish OpenSSH (as is shipped with git for Windows) and the SSH agent shipped with Windows, you need something that bridges between those. The state of the art seems to be to use npiperelay with socat, but if you're already writing something that implements the Cygwin socket protocol you can just use npipe to talk to the shipped ssh-agent and then export your own socket interface.
And, amazingly, this all works? I've managed to hack together an SSH agent (using Go's SSH agent implementation) that can satisfy hardware backed queries itself, but forward things on to the Windows agent for compatibility with other tooling. Now I just need to figure out how to plumb it through to WSL. Sigh.
comments
Keystroke timing obfuscation added to ssh(1)
Damien Miller (djm@) has committed support for keystroke timing obfuscation to ssh(1):
CVSROOT: /cvs Module name: src Changes by: djm@cvs.openbsd.org 2023/08/27 21:31:16 Modified files: usr.bin/ssh : clientloop.c misc.c misc.h packet.c packet.h readconf.c readconf.h ssh_config.5 Log message: Add keystroke timing obfuscation to the client. This attempts to hide inter-keystroke timings by sending interactive traffic at fixed intervals (default: every 20ms) when there is only a small amount of data being sent. It also sends fake "chaff" keystrokes for a random interval after the last real keystroke. These are controlled by a new ssh_config ObscureKeystrokeTiming keyword/ feedback/ok markus@Linux Plumbers Conference: Confidential Computing MC CFP
Confidential Computing is continuing to remain a popular topic in computing industry. From memory encryption to trusted I/O, hardware has been constantly improving and broadening. In the past years, confidential computing microconferences have brought together developers working on various features in hypervisors, firmware, Linux kernel, low level userspace up to container runtimes. We have discussed a broad range of topics, ranging from, hardware enablement to generic attestation workflows.
Just in the last year, we have seen support for Intel TDX and AMD SEV-SNP guests merged into Linux. Support for unaccepted memory has also landed in mainline. We have also had support for running as a CVM under Hyper-V partially merged into the kernel. However, there is still a long way to go before a complete Confidential Computing stack with open source software and Linux as the hypervisor becomes a reality. We invite contributions to this microconference to help make progress to that goal.
Topics of interest include
- Attestation workflows
- Confidential Computing threat model
- Secure VM Service module (SVSM) and paravisor architecture and implementation
- Live migration of confidential virtual machines
- ARM64 Confidential Computing
- RISC-V CoVE
- Secure IO and device attestation
- Intel TDX Connect
- AMD SEV-TIO
Please use the LPC CfP process to submit your proposals. Submissions can be made via the LPC abstract submission page. Make sure to select “Confidential Computing MC” as the track.
[$] Development statistics for the 6.5 kernel
Bugzilla Celebrates 25 Years With Special Announcements (Bugzilla blog)
Security updates for Monday
The 6.5 kernel has been released
I still have this nagging feeling that a lot of people are on vacation and that things have been quiet partly due to that. But this release has been going smoothly, so that's probably just me being paranoid. The biggest patches this last week were literally just to our selftests.
Headline features in 6.5 include faster booting on large x86 systems, Arm Permission Indirection Extension support, Rust 1.68.2 support, unaccepted memory handling, "mount beneath" support for filesystems, the cachestat() system call, the ability to pass a pidfd via a SCM_CREDENTIALS control message, scope-based resource management for internal kernel code, the deprecation of the SLAB allocator, and more. See the LWN merge-window summaries (part 1, part 2) and the (in-progress) KernelNewbies 6.5 page for details.
Three stable kernels
Update: 6.1.49 has also been released. "This upgrade is only for all users of the 6.1 series that use the x86 platform OR the F2FS file system. If that's not you, feel free to ignore this release."
OpenTF Announces Fork of Terraform
Some of the people behind OpenTF are participating in a Hacker News thread, so more information can be found there as well.
[$] The OpenSprinkler controller
Security updates for Friday
A támadók TP-Link okosizzókon keresztül képesek megszerezni jelszavainkat
Olasz és brit kutatók négy olyan sebezhetőséget fedeztek fel a TP-Link Tapo L530E okosizzóban és a TP-Link Tapo alkalmazásában, amelyek lehetővé teszik a támadók számára, hogy ellopják a célpontok WiFi jelszavát.
The post A támadók TP-Link okosizzókon keresztül képesek megszerezni jelszavainkat first appeared on Nemzeti Kibervédelmi Intézet.