this post was submitted on 30 Mar 2024
580 points (100.0% liked)

linuxmemes

24254 readers
2012 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     
    top 50 comments
    sorted by: hot top controversial new old
    [–] [email protected] 119 points 1 year ago (2 children)

    OpenSUSE Tumbleweed has it. The Fedora 40 beta has it. Its just a result of being bleeding edge. Arch doesn't have exclusive rights to that.

    [–] [email protected] 19 points 1 year ago (1 children)
    [–] [email protected] 6 points 1 year ago (1 children)
    load more comments (1 replies)
    load more comments (1 replies)
    [–] [email protected] 117 points 1 year ago (2 children)

    Incorrect: the backdoored version was originally discovered by a Debian sid user on their system, and it presumably worked. On arch it's questionable since they don't link sshd with liblzma (although some say some kind of a cross-contamination may be possible via a patch used to support some systemd thingy, and systemd uses liblzma). Also, probably the rolling opensuse, and mb Ubuntu. Also nixos-unstalbe, but it doesn't pass the argv[0] requirements and also doesn't link liblzma. Also, fedora.

    Btw, https://security.archlinux.org/ASA-202403-1

    [–] [email protected] 19 points 1 year ago

    Sid was that dickhead in Toystory that broke the toys.

    If you're running debian sid and not expecting it to be a buggy insecure mess, then you're doing debian wrong.

    [–] [email protected] 5 points 1 year ago (2 children)

    Fedora and debian was affected in beta/dev branch only, unlike arch

    [–] [email protected] 5 points 1 year ago

    Unlike arch that has no "stable". Yap, sure; idk what it was supposed to mean, tho.

    load more comments (1 replies)
    [–] [email protected] 93 points 1 year ago (4 children)

    most stable

    How the hell is arch more stable than Debian?

    [–] [email protected] 13 points 1 year ago (2 children)

    i think it’s a matter of perspective. if i’m deploying some containers or servers on a system that has well defined dependencies then i think Debian wins in a stability argument.

    for me, i’m installing a bunch of experimental or bleeding edge stuff that is hard to manage in even a non LTS Debian system. i don’t need my CUDA drivers to be battle tested, and i don’t want to add a bunch of sketchy links to APT because i want to install a nightly version of neovim with my package manager. Arch makes that stuff simple, reliable, and stable, at least in comparison.

    [–] [email protected] 10 points 1 year ago

    "Stable" doesn't mean "doesn't crash", it means "low frequency of changes". Debian only makes changing updates every few years, and you can wait a few more years before even taking those changes without losing security support while Arch makes changing updates pretty much every time a package you have installed does.

    In no way is Arch more stable than Debian (other than maybe Debian Unstable/Sid, but even then it's likely a bit of a wash)

    load more comments (1 replies)
    [–] [email protected] 8 points 1 year ago

    Just Arch users being delusional. Every recent thread that had Arch mentioned in the comments has some variation of "Arch is the most stable distro" or "Stable distros have more issues than Arch".

    [–] [email protected] 7 points 1 year ago (5 children)
    [–] [email protected] 16 points 1 year ago

    It literally does though. Stable doesn't mean bug free. It means unchanging. That's what the term "stable distro" actually means. That the software isn't being updated except for security patches. When people say stable distro, that is what they are trying to communicate. That means the software will be old. That's what stable actually means.

    load more comments (4 replies)
    [–] MyNamesNotRobert 7 points 1 year ago* (last edited 1 year ago) (12 children)

    In my experience they're the same from a reliability standpoint. Stuff on Arch will break for no reason after an update. Stuff on Debian will break for no reason after an update. It's just as difficult to solve reliability problems on both.

    Because Debian isn't a rolling release you will often run into issues where a bug got fixed in a future version of whatever program it is but not the one that's available in the repository. Try using yt-dlp on any stable Debian installation and it won't work for example.

    Arch isn't without its issues. Half of the good stuff is on the AUR, and fuck the AUR. Stuff only installs without issues half the time. Good luck installing stuff that needs like 13+ other AUR packages as dependencies because non of that shit can be installed automatically. On other distros,all that stuff can be installed automatically and easily with a single command.

    I use Arch btw.

    [–] [email protected] 4 points 1 year ago

    You can get yay for an AUR package manager, but it's generally not recommended because it means blindly trusting the build scripts for community packages that have no real oversight. You're typically advised to check the build script for every AUR package you install.

    load more comments (11 replies)
    [–] [email protected] 92 points 1 year ago (4 children)

    I thought Arch was the only rolling distro that doesn't have the backdoor. Its sshd is not linked with liblzma, and even if it were, they compile xz directly from git so they wouldn't have gotten the backdoor anyway.

    [–] [email protected] 30 points 1 year ago

    TBF they only switched to building from git after they were notified of the backdoor yesterday. Prior to that, the source tarball was used.

    [–] [email protected] 24 points 1 year ago* (last edited 1 year ago) (1 children)

    liblzma is the problem. sshd is just the first thing they found that it is attacking. liblzma is used by firefox and many other critical packages.

    [–] [email protected] 32 points 1 year ago (1 children)

    Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command:

    ldd "$(command -v sshd)"
    
    [–] [email protected] 18 points 1 year ago* (last edited 1 year ago) (4 children)

    Yes, this sshd attack vector isn't possible. However, they haven't decomposed the exploit and we don't know the extent of the attack. The reporter of the issue just scratched the surface. If you are using Arch, you should run pacman right now to downgrade.

    [–] [email protected] 35 points 1 year ago

    They actually have an upgrade fix for it, at least for the known parts of it. Doing a standard system upgrade will replace the xz package with one with the known backdoor removed.

    [–] [email protected] 15 points 1 year ago

    If you are using Arch, you should run pacman right now to downgrade.

    No, just update. It's already fixed. Thats the point of rolling release.

    load more comments (2 replies)
    [–] [email protected] 11 points 1 year ago* (last edited 1 year ago)

    Interestingly, looking at Gentoo's package, they have both the github and tukaani.org URLs listed:

    https://github.com/gentoo/gentoo/blob/master/app-arch/xz-utils/xz-utils-5.6.1.ebuild#L28

    From what I understand, those wouldn't be the same tarball, and might have thrown an error.

    load more comments (1 replies)
    [–] [email protected] 91 points 1 year ago (1 children)
    [–] [email protected] 5 points 1 year ago (2 children)

    It is not entirely clear either this exploit can affect other parts of the system. This is one those things you need to take extremely seriously

    load more comments (2 replies)
    [–] [email protected] 68 points 1 year ago* (last edited 1 year ago) (1 children)

    Arch is not vulnerable to this attack vector. Fedora Rawhide, OpenSUSE Tumbleweed and Debian Testing are.

    [–] [email protected] 10 points 1 year ago (6 children)

    Notice normal distros aren't affected

    load more comments (6 replies)
    [–] [email protected] 52 points 1 year ago* (last edited 1 year ago) (5 children)

    Arch has already updated XZ by relying on the source code repository itself instead of the tarballs that did have the manipulations in them.

    It's not ideal since we still rely on a potentially *otherwise* compromised piece of code still but it's a quick and effective workaround without massive technical trouble for the issue at hand.

    load more comments (5 replies)
    [–] [email protected] 51 points 1 year ago (2 children)

    https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/

    There are no known reports of those versions being incorporated into any production releases for major Linux distributions, but both Red Hat and Debian reported that recently published beta releases used at least one of the backdoored versions [...] A stable release of Arch Linux is also affected. That distribution, however, isn't used in production systems.

    Ouch

    [–] [email protected] 27 points 1 year ago (1 children)

    Also,

    Arch is the most stable

    Are you high?

    [–] [email protected] 13 points 1 year ago (6 children)

    I think the confusion comes from the meaning of stable. In software there are two relevant meanings:

    1. Unchanging, or changing the least possible amount.

    2. Not crashing / requiring intervention to keep running.

    Debian, for example, focuses on #1, with the assumption that #2 will follow. And it generally does, until you have to update and the changes are truly massive and the upgrade is brittle, or you have to run software with newer requirements and your hacks to get it working are brittle.

    Arch, for example, instead focuses on the second definition, by attempting to ensure that every change, while frequent, is small, with a handful of notable exceptions.

    Honestly, both strategies work well. I've had debian systems running for 15 years and Arch systems running for 12+ years (and that limitation is really only due to the system I run Arch on, rather than their update strategy.

    It really depends on the user's needs and maintenance frequency.

    load more comments (6 replies)
    [–] [email protected] 17 points 1 year ago* (last edited 1 year ago)

    A stable release of Arch Linux is

    not a thing.

    Ars uses AI now?

    [–] [email protected] 47 points 1 year ago* (last edited 1 year ago)

    Bro WTF. How about you actually read up on the backdoor before slandering Arch. The backdoor DOES NOT affect Arch.

    [–] [email protected] 46 points 1 year ago* (last edited 1 year ago) (3 children)

    It has the freshest packages, ahead of all distros

    Let me introduce you to Nixpkgs. Its packages are "fresher" than Arch's by a large margin. Even on stable channels.

    https://repology.org/repositories/statistics/newest

    load more comments (3 replies)
    [–] [email protected] 19 points 1 year ago (1 children)
    [–] [email protected] 16 points 1 year ago (2 children)
    [–] [email protected] 24 points 1 year ago (1 children)

    Very common compression utility for LZMA (.xz file)

    Similar to .gzip, .zip, etc.

    [–] [email protected] 4 points 1 year ago* (last edited 1 year ago)

    It's definitely common, but zstd is gaining on it since in a lot of cases it can produce similarly-sized compressed files but it's quicker to decompress them. There's still some cases where xz is better than zstd, but not very many.

    [–] [email protected] 20 points 1 year ago

    People doesn't even know what ~~a rootkit~~ XZ is, why should they care? -Sony CEO probably

    [–] [email protected] 12 points 1 year ago (1 children)

    Arch users are really just cannon fodder against supply chain attacks.

    [–] [email protected] 5 points 1 year ago

    We're the front line dog. Strike me down so Debian Stable's legacy may live on.

    [–] [email protected] 5 points 1 year ago* (last edited 1 year ago)

    I just did: "rm -rf xz"

    pacman -Syu
    find / -name "*xz*"  | sort | grep -e '\.xz$' | xargs -o -n1 rm -i 
    pacman -Qqn | pacman -S -
    

    (and please, absolutely don't run above as root. Just don't.) I carefully answered to retain any root owned files and my backups, despite knowing the backdoor wasn't included in the culprit package. This system has now "un-trusted" status, meaning I'll clean re-install the OS, once the full analysis of the backdoor payload is available.

    Edit: I also booted the "untrusted" system without physical access to the web, no gui, and installed the fixed package transferred to it locally. (that system is also going to be dd if=/dev/zero'd)

    [–] [email protected] 5 points 1 year ago

    void doesnt have it :3

    load more comments
    view more: next β€Ί