xz incident shows the need for structural change (in FLOSS maintenance & funding)
FYI: by Sovereign Tech Fund https://www.sovereigntechfund.de/news/xz-structural-change APRIL 4, 2024 BY ADRIANA GROH " xz incident shows the need for structural change" At Sovereign Tech Fund, we're following the xz incident closely and listening to the many voices in the FOSS maintainer community. There are clear signs that this is a sophisticated attack, but experts are still analyzing it, and it seems we won't know all the facts for a while. At this time, we don't want to point at any single cause and certainly don’t want to suggest a quick fix. We would, however, like to point out again the huge importance of digital infrastructure, which is regrettably overlooked and invisible to most of us. xz is merely the most recent example to illustrate how important the open source ecosystem is for all of us. At the same time, it shows very clearly how serious the structural issues are: for example, not enough new contributors, too few experienced contributors, too little recognition, and not enough (long-term) support from various stakeholders. One consequence is burnout among unpaid volunteers, which is unfortunately not a rare occurrence. If we keep ignoring these systemic issues, this house of cards will be our undoing (see our favorite xkcd comic). A great many companies and organizations incorporate and use critical open source components without ensuring that they are maintained and secured at all. We see this kind of maintenance as an undertaking that is in the public interest. It should not be the responsibility of unpaid volunteers alone, nor should it rest wholly on the private sector. It's a task whose importance society as a whole needs to acknowledge, and should be prioritized accordingly. As we saw with Heartbleed (2014), Log4Shell (2021) and other incidents, foundational open source technologies are essential parts of modern digital infrastructure. They underpin all (not just digital) endeavors, both in the public and private sectors. Just as physical infrastructure like roads, railways, and water systems are constantly being maintained, these digital components also need to be serviced and updated in order to serve as the foundation for digital sovereignty, a successful economy, and a resilient democratic society. Since the creation of the Sovereign Tech Fund, we have been exploring different support mechanisms to fulfill our mission of supporting the development, improvement, and maintenance of open digital infrastructure. We are currently working on more ways to tackle these challenges. Financial support for the people behind the code is a good first step and an important building block. However, to increase the long-term success of our mission, complementary and reinforcing mechanisms are needed. We are in contact with maintainers and FOSS communities as we develop and test these additional mechanisms. Our areas of focus include improving software maintainability, increasing bug resilience, better developer tooling, reducing technical debt, and expanding the communities of FOSS contributors. We welcome you to share your ideas, feedback, or constructive criticism with us. Through Sunday, 7 April 2024, we are especially eager to hear from open source maintainers who would like to fill out our fellowship pilot program survey. https://www.sovereigntechfund.de/news/foss-maintainer-fellowship-survey We see the creation of and commitment to the Sovereign Tech Fund by SPRIND and the German Ministry for Economic Affairs and Climate Action as a clear sign of the increasing awareness of the open source ecosystem’s significance. We hope that our plans for the future will inspire many others to join us in this work and have a lasting impact together. Incidents like xz – others will surely follow – show that we have a major task ahead of us for the foreseeable future.
Hi, On Thu, Apr 11, 2024 at 03:26:35PM +0200, Vesna Manojlovic wrote:
FYI: by Sovereign Tech Fund https://www.sovereigntechfund.de/news/xz-structural-change
Thanks! And for a concise and technical background document, see https://tukaani.org/xz-backdoor/ ( quoted below ). Bye, Joost ----------------------------------------------------------------------------- XZ Utils backdoor Lasse Collin This page will get updated as I learn more about the incident. 2024-04-09: The Git repositories of XZ projects are available on GitHub again. The email address xz at tukaani dot org forwards to me only. This change was made on 2024-03-30. xz.tukaani.org DNS name (CNAME) has been removed and won’t be restored. The XZ projects have moved to their old URLs on tukaani.org. XZ Utils’s home page is under construction still though. To media and reporters I won’t reply for now because first I need to understand the situation thoroughly enough. It’s enough to reload this page once per 48 hours to check if this message has changed. Email I have gotten a lot of email. Thanks for the positive comments. Unfortunately I don’t have time to reply to most of them. Facts • CVE-2024-3094 • XZ Utils 5.6.0 and 5.6.1 release tarballs contain a backdoor. These tarballs were created and signed by Jia Tan. • Tarballs created by Jia Tan were signed by him. Any tarballs signed by me were created by me. • GitHub accounts of both me (Larhzu) and Jia Tan were suspended. Mine was reinstated on 2024-04-02. • Only I have had access to the main tukaani.org website, git.tukaani.org repositories, and related files. Jia Tan only had access to things hosted on GitHub, including xz.tukaani.org subdomain (and only that subdomain). Plans I plan to write an article how the backdoor got into the releases and what can be learned from this. I’m still studying the details. xz.git needs to be gotten to a state where I’m happy to say I fully approve its contents. It is debated whether to rebase the master branch to purge the malicious files so that they wont’t trip antivirus software or such. Currently the opinion is somewhat tilted towards not rebasing. Review of the repository is being made. This has higher priority right now than the pending article. These will unfortunately but obviously take several days. A clean stable XZ Utils release version is likely to jump to 5.8.0. It should clearly separate the clean one from the bad 5.6.x. Links • Details by Andres Freund [ https://www.openwall.com/lists/oss-security/2024/03/29/4 ] • FAQ by Sam James • Gentoo bug 928134 [ bugs.gentoo.org/928134 ] • Debian bug 1068024 [ bugs.debian.org/1068024 ] Last updated 2024-04-09 22:26:37 +0300 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
participants (2)
-
Joost van Baal-Ilić
-
Vesna Manojlovic