• @gnuplusmatt@reddthat.com
    link
    fedilink
    143 months ago

    some people in my mastodon feed are suggesting that the backdoor might have connected out to malicious infrastructure or substituted its own SSH host keys, but I can’t find any clear confirmation. More info as the investigation progresses.

    I guess at this point if you’re on Fedora 40 or rawhide clear / regen your host keys, even after xz version rollback

    • @Deathcrow@lemmy.ml
      link
      fedilink
      93 months ago

      or substituted its own SSH host keys,

      why would the backdoor do that? It would immediately expose itself because every ssh client on the planet warns about changed host keys when connecting.

      • @gnuplusmatt@reddthat.com
        link
        fedilink
        3
        edit-2
        3 months ago

        Perhaps it was a poorly worded way of suggesting that invalidating host keys would invalidate all client keys it could potentially generate? Either way it’s a lot of speculation.

        Resetting the keys and SSH config on any potentially compromised host is probably not a terrible idea

      • @gnuplusmatt@reddthat.com
        link
        fedilink
        43 months ago

        Nuke from orbit might be an overreaction, if you need that machine perhaps disable ssh or turn the machine off until later next week when the postmortems happen. If you need that trusted machine now, then yes fresh install

        • Possibly linux
          link
          fedilink
          English
          33 months ago

          Honestly doing a fresh install is a good test of your recovery abilities. You should always have a way to restore critical content in an emergency

          • @afterthoughts@lemmy.ca
            link
            fedilink
            1
            edit-2
            3 months ago

            I feel legitimately sorry for anyone who takes your rhetoric to heart.

            Try not to let these 🧩’s pull you down rabbit holes, guys.