(评论)
(comments)

原始链接: https://news.ycombinator.com/item?id=43448075

Hacker News 上的一个帖子讨论了 NixOS 和可复现构建是否能够检测到 xz 后门。原文暗示它们可以。然而,一位 NixOS 开发者澄清说,虽然恶意 xz 版本被分发给了 NixOS 用户,但由于其目标是其他系统,所以实际上并没有发挥作用。 讨论强调,技术解决方案并非总能防止“现实世界攻击”(meatspace exploits),指的是社会工程学或内部威胁。虽然可复现构建和 NixOS 可能会使隐藏后门变得更加困难,但它们并非万无一失。内部人员仍然可以引入恶意代码。 一位评论者警告不要声称 Nix 本身就具有安全性,并预测最终会成功利用其漏洞。另一位则认为,与传统的构建系统相比,Nix 提供了更高的安全性,即使无法实现绝对安全,也使得利用它变得更加困难和昂贵。核心争论在于技术安全措施与始终存在的人为漏洞风险之间的平衡。


原文
Hacker News new | past | comments | ask | show | jobs | submit login
NixOS and reproducible builds could have detected the xz backdoor (luj.fr)
35 points by birdculture 1 hour ago | hide | past | favorite | 4 comments










Note that NixOS and reproducible builds did not detect the xz backdoor, and in fact NixOS shipped the malicious builds of xz (though they didn't do anything because the malware didn't target NixOS):

> I am a NixOS developer and I was surprised when the backdoor was revealed to see that the malicious version of xz had ended up being distributed to our users.

As always theory and reality are different, and the thing that made xz possible was never a technical vulnerability with a technical solution—xz was possible because of a meatspace exploit. We as a community are very very bad at recognizing that you can't always just patch meatspace with better software.



Yeah it certainly would have made hiding the backdoor more difficult. But far from impossible. You can always hide backdoors in source code if you want, it just takes more effort to make a plausible bug, and probably has a higher chance of detection.


Yes, if you use a trusted framework then you are safe from things until that framework is attacked. The xz backdoor might have been detected, but the xz backdoor wasn't crafted with the goal of working against the Nix ecosystem. When a nix core developer ends up being a spy or whatever then there will end up being an attack against the nix ecosystem. Don't reply to this with some claim that Nix is inherently secure unless you want me to track you down and make you admit you were wrong when Nix ends up getting successfully exploited in a year or two.


The standard never has been and never will be absolute security. That’s an impossible threshold nothing would ever meet even though it’s objectively true that software today is generally more secure than software 30 years ago. The strongman claim being made is “Nix is harder and more expensive to exploit than traditional build systems”. So sure, if you find a cheap way to exploit Nix, track me down. But until then, it remains at least plausible & in practice very likely that Nix is harder to exploit than alternate systems on a technical level.






Join us for AI Startup School this June 16-17 in San Francisco!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact



Search:
联系我们 contact @ memedata.com