Hírolvasó

Több Code Signing tanúsítványt is elloptak a GitHub-tól

2 év 6 hónap óta

A Microsoft tulajdonában lévő leányvállalat hétfőn hozta nyilvánosságra, hogy ismeretlen elkövetők sikeresen hozzáfértek a GitHub Mac asztali verziójához és az Atom alkalmazások egyes verzióihoz tartozó titkosított kód aláíró tanúsítványokhoz. A történtek hatására a cég óvintézkedésként visszavonja a nyilvánosságra került tanúsítványokat, ami a következő verziókat érinti: GitHub Desktop for Mac: 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, […]

The post Több Code Signing tanúsítványt is elloptak a GitHub-tól first appeared on Nemzeti Kibervédelmi Intézet.

NKI

Maintainer confidential: Opportunities and challenges of the ubiquitous but under-resourced Yocto Project (Linux.com)

2 év 6 hónap óta
Over at Linux.com, Yocto Project architect Richard Purdie writes about various kinds of problems that the project is experiencing, some of which stem from its success and growth. It is a story that will likely resonate with other open-source projects. Our scale also means patch requirements are more demanding now. Once, when the number of people using the project was small, the impact of breaking things was also more limited, allowing a little more freedom in development. Now, if we accept a change commit and something breaks, it becomes an instant emergency, and I’m generally expected to resolve it. When patches come from trusted sources, help will often be available to address the regressions as part of an unwritten bond between developers and maintainers. This can intimidate new contributors; they can also find our testing requirements too difficult.

We did have tooling to help new contributors—and also the maintainers—by spotting simple, easily detected errors in incoming patches. This service would test and then reply to patches on the mailing list with pointers on how to fix the patches, freeing maintainer time and helping newcomers. Sadly, such tools require maintenance, and we lost the people who knew how to look after this component, so it stopped working. We formed plans to bring it back and make the maintenance easier, but we’ve struggled to find anyone with the time to do it. I’ve wondered if I should personally try to do it; however, I just can’t spend the chunk of time needed on one thing like that, as I would neglect too many other things for too long.

jake

[$] The Linux SVSM project

2 év 6 hónap óta
If legacy networks are like individual homes with a few doors where a handful of people have the key, then cloud-based environments are like apartment complexes that offer both higher density and greater flexibility, but which include more key holders and potential entry points. The importance of protecting virtual machines (VMs) running in these environments — from both the host and other tenants — has become increasingly clear. The Linux Secure VM Service Module (SVSM) is a new, Rust-based, open-source project that aims to help preserve the confidentiality and integrity of VMs on AMD hardware.
corbet

Security updates for Monday

2 év 6 hónap óta
Security updates have been issued by Debian (curl, dojo, git, lemonldap-ng, libapache-session-browseable-perl, libapache-session-ldap-perl, libzen, node-object-path, openjdk-11, sofia-sip, tiff, tor, and varnish), Fedora (libgit2, open62541, pgadmin4, rubygem-git, rust-bat, rust-cargo-c, rust-git-delta, rust-gitui, rust-libgit2-sys, rust-libgit2-sys0.12, rust-pore, rust-pretty-git-prompt, rust-rd-agent, rust-rd-hashd, rust-resctl-bench, rust-resctl-demo, rust-silver, and rust-tokei), Scientific Linux (thunderbird), SUSE (ffmpeg, krb5, nginx, python39-setuptools, sssd, systemd, tiff, and virtualbox), and Ubuntu (linux-azure, linux-azure-5.4, linux-raspi2, linux-azure-fde, and mysql-5.7, mysql-8.0).
jake

Ezek a VMware sebezhetőségek mielőbb patchelendők

2 év 6 hónap óta

A WMware nemrég négy biztonsági rést javított az említett eszközben, amelyek közül kettő kritikus besorolású volt. A Horizon3's Attack Team e hét során tervez exploitot publikálni a hibák kihasználásának demonstrálásához, ám ennek nyomán valós kihasználási próbálkozások is várhatóak.

The post Ezek a VMware sebezhetőségek mielőbb patchelendők first appeared on Nemzeti Kibervédelmi Intézet.

NKI

5 különböző wiperrel vettek célba egy ukrán hírügynökséget

2 év 6 hónap óta

Az ukrán CERT (CERT-UA) öt különböző adattörlő (data-wiper) malware-t fedezett fel a nemzeti hírügynökség, az Ukrinform hálózatán 2023. január 17-én. A CERT-UA közleménye szerint a rosszindulatú programok – funkcionalitásukat tekintve – az információk integritásának és elérhetőségének megsértését célozták. A szóban forgó wiperek között szerepel a CaddyWiper (Windows), ZeroWipe (Windows), SDelete (Windows), AwfulShred (Linux) és a […]

The post 5 különböző wiperrel vettek célba egy ukrán hírügynökséget first appeared on Nemzeti Kibervédelmi Intézet.

NKI

Kibertámadás ért német reptereket és közintézményeket

2 év 6 hónap óta

Német repterek, államigazgatási és pénzügyi szervezetek weboldali ellen indított túlterheléses (DDoS) támadást a Killnet orosz hackercsoport elosztott – jelezte a német Szövetségi Információbiztonsági Hatóság (BSI) múlt hét csütörtökön.

The post Kibertámadás ért német reptereket és közintézményeket first appeared on Nemzeti Kibervédelmi Intézet.

NKI

Execute-only status report

2 év 6 hónap óta

Theo de Raadt (deraadt@) posted to tech@ a status report (and 2 test programs) regarding execute-only (xonly). The report begins:

We've made good progress in the xonly effort so here's a small summary. architectures crossed over completely arm64 - X bit without implied R in mmu riscv64 - X bit without implied R in mmu amd64 - using hardware 'PKU' feature powerpc64 - using feature similar to PKU hppa - using gateway feature

Kernel prepatch 6.2-rc6

2 év 6 hónap óta
The 6.2-rc6 kernel prepatch is out for testing.

It's suspiciously small, but who am I to look a gift horse in the mouth? I'll take it and hope it's not an aberration, but instead a sign that 6.2 is shaping up nicely. Call me optimistic, call me naive, but let's enjoy it and hope the trend continues.

The plan is still to do an -rc8, though, meaning that the final 6.2 release can be expected on February 19.

corbet

Matthew Garrett: Further adventures in Apple PKCS#11 land

2 év 6 hónap óta
After my previous efforts, I wrote up a PKCS#11 module of my own that had no odd restrictions about using non-RSA keys and I tested it. And things looked much better - ssh successfully obtained the key, negotiated with the server to determine that it was present in authorized_keys, and then went to actually do the key verification step. At which point things went wrong - the Sign() method in my PKCS#11 module was never called, and a strange
debug1: identity_sign: sshkey_sign: error in libcrypto
sign_and_send_pubkey: signing failed for ECDSA "testkey": error in libcrypto"
error appeared in the ssh output. Odd. libcrypto was originally part of OpenSSL, but Apple ship the LibreSSL fork. Apple don't include the LibreSSL source in their public source repo, but do include OpenSSH. I grabbed the OpenSSH source and jumped through a whole bunch of hoops to make it build (it uses the macosx.internal SDK, which isn't publicly available, so I had to cobble together a bunch of headers from various places), and also installed upstream LibreSSL with a version number matching what Apple shipped. And everything worked - I logged into the server using a hardware-backed key.

Was the difference in OpenSSH or in LibreSSL? Telling my OpenSSH to use the system libcrypto resulted in the same failure, so it seemed pretty clear this was an issue with the Apple version of the library. The way all this works is that when OpenSSH has a challenge to sign, it calls ECDSA_do_sign(). This then calls ECDSA_do_sign_ex(), which in turn follows a function pointer to the actual signature method. By default this is a software implementation that expects to have the private key available, but you can also register your own callback that will be used instead. The OpenSSH PKCS#11 code does this by calling EC_KEY_set_method(), and as a result calling ECDSA_do_sign() ends up calling back into the PKCS#11 code that then calls into the module that communicates with the hardware and everything works.

Except it doesn't under macOS. Running under a debugger and setting a breakpoint on EC_do_sign(), I saw that we went down a code path with a function called ECDSA_do_sign_new(). This doesn't appear in any of the public source code, so seems to be an Apple-specific patch. I pushed Apple's libcrypto into Ghidra and looked at ECDSA_do_sign() and found something that approximates this:nid = EC_GROUP_get_curve_name(curve); if (nid == NID_X9_62_prime256v1) { return ECDSA_do_sign_new(dgst,dgst_len,eckey); } return ECDSA_do_sign_ex(dgst,dgst_len,NULL,NULL,eckey); What this means is that if you ask ECDSA_do_sign() to sign something on a Mac, and if the key in question corresponds to the NIST P256 elliptic curve type, it goes down the ECDSA_do_sign_new() path and never calls the registered callback. This is the only key type supported by the Apple Secure Enclave, so I assume it's special-cased to do something with that. Unfortunately the consequence is that it's impossible to use a PKCS#11 module that uses Secure Enclave keys with the shipped version of OpenSSH under macOS. For now I'm working around this with an SSH agent built using Go's agent module, forwarding most requests through to the default session agent but appending hardware-backed keys and implementing signing with them, which is probably what I should have done in the first place.

comments

Rust 1.67.0 released

2 év 6 hónap óta
Version 1.67.0 of the Rust language has been released. The list of new features is relatively short; it includes support for #[must_use] on async functions and a new multi-producer, single-consumer channel implementation.
corbet

[$] GFP flags and the end of __GFP_ATOMIC

2 év 6 hónap óta
Memory allocation within the kernel is a complex business. The amount of physical memory available on any given system will be strictly limited, meaning that an allocation request can often only be satisfied by taking memory from somebody else, but some of the options for reclaiming memory may not be available when a request is made. Additionally, some allocation requests have requirements dictating where that memory can be placed or how quickly the allocation must be made. The kernel's memory-allocation functions have long supported a set of "GFP flags" used to describe the requirements of each specific request. Those flags will probably undergo some changes soon as the result of this patch set posted by Mel Gorman; that provides an opportunity to look at those flags in some detail.
corbet

Security updates for Friday

2 év 6 hónap óta
Security updates have been issued by Debian (bind9, chromium, and modsecurity-apache), Fedora (libgit2, mediawiki, and redis), Oracle (go-toolset:ol8, java-1.8.0-openjdk, systemd, and thunderbird), Red Hat (java-1.8.0-openjdk and redhat-ds:12), SUSE (apache2, bluez, chromium, ffmpeg-4, glib2, haproxy, kernel, libXpm, podman, python-py, python-setuptools, samba, xen, xrdp, and xterm), and Ubuntu (samba).
jake

[$] Reconsidering BPF ABI stability

2 év 6 hónap óta
The BPF subsystem exposes many aspects of the kernel's internal algorithms and data structures; this naturally leads to concerns about maintaining interface stability as the kernel changes. The longstanding position that BPF offers no interface-stability guarantees to user space has always seemed a little questionable; kernel developers have, in the past, found themselves having to maintain interfaces that were not intended to be stable. Now the BPF community is starting to think about what it might mean to provide explicit stability promises for at least some of its interfaces.
corbet

McKenney: What Does It Mean To Be An RCU Implementation?

2 év 6 hónap óta
Paul McKenney looks at a couple of Rust crates in an attempt to determine whether they actually implement the read-copy-update algorithm; in the process, he gives an overview of the numerous RCU variants in the kernel.

Except that the first RCU crate, rcu_clean, throws a monkey wrench into the works. It does not have any grace-period primitives, but instead a clean() function that takes a reference to a RCU-protected data item. The user invokes this at some point in the code where it is known that there are no readers, either within this thread or anywhere else. In true Rust fashion, in some cases, the compiler is able to prove the presence or absence of readers and issue a diagnostic when needed.

corbet

Security updates for Thursday

2 év 6 hónap óta
Security updates have been issued by Debian (git), Fedora (libXpm and redis), Oracle (bind, firefox, grub2, java-1.8.0-openjdk, java-11-openjdk, kernel, libtasn1, libXpm, and sssd), Red Hat (thunderbird), SUSE (freeradius-server, kernel, libzypp-plugin-appdata, python-certifi, and xen), and Ubuntu (bind9, krb5, linux-raspi, linux-raspi-5.4, and privoxy).
jake

Legitim távoli asztal eszközökkel törik fel a szövetségi ügynökségek rendszereit

2 év 6 hónap óta

A CISA, az NSA, valamint az MS-ISAC közösen figyelmeztet arra, hogy a támadók egyre gyakrabban használnak törvényes és jogtiszta távoli megfigyelő- és felügyeleti (RMM) szoftvereket a támadások során. A CISA – a 2022. október közepén kiadott Silent Push jelentés megjelenése után – rosszindulatú tevékenységet fedezett fel több szövetségi ügynökség (FCEB) hálózatán az EINSTEIN behatolás-észlelő rendszer […]

The post Legitim távoli asztal eszközökkel törik fel a szövetségi ügynökségek rendszereit first appeared on Nemzeti Kibervédelmi Intézet.

NKI