原文
| ||||||||||
| ||||||||||
![]() |
原始链接: https://news.ycombinator.com/item?id=43448075
Hacker News 上的一个帖子讨论了 NixOS 和可复现构建是否能够检测到 xz 后门。原文暗示它们可以。然而,一位 NixOS 开发者澄清说,虽然恶意 xz 版本被分发给了 NixOS 用户,但由于其目标是其他系统,所以实际上并没有发挥作用。 讨论强调,技术解决方案并非总能防止“现实世界攻击”(meatspace exploits),指的是社会工程学或内部威胁。虽然可复现构建和 NixOS 可能会使隐藏后门变得更加困难,但它们并非万无一失。内部人员仍然可以引入恶意代码。 一位评论者警告不要声称 Nix 本身就具有安全性,并预测最终会成功利用其漏洞。另一位则认为,与传统的构建系统相比,Nix 提供了更高的安全性,即使无法实现绝对安全,也使得利用它变得更加困难和昂贵。核心争论在于技术安全措施与始终存在的人为漏洞风险之间的平衡。
| ||||||||||
| ||||||||||
![]() |
> I am a NixOS developer and I was surprised when the backdoor was revealed to see that the malicious version of xz had ended up being distributed to our users.
As always theory and reality are different, and the thing that made xz possible was never a technical vulnerability with a technical solution—xz was possible because of a meatspace exploit. We as a community are very very bad at recognizing that you can't always just patch meatspace with better software.
reply