• @TangledHyphae
      link
      0
      edit-2
      3 months ago

      The slowness is on purpose? To help identify the sshd in question to the attacker which nodes are compromised? What reason(s) could there be?

      • @[email protected]
        link
        fedilink
        English
        63 months ago

        He’s talking about Debian’s slowness in getting new versions to stable, and how the meme ignores security backports.

        • @TangledHyphae
          link
          13 months ago

          Ohh that makes way more sense, thanks. I haven’t used Debian in like 10 years but it was obviously the same back then too.

      • @mumblerfish
        link
        23 months ago

        If the above decides to continue, the code appears to be parsing the symbol tables in memory. This is the quite slow step that made me look into the issue.

        That is from the original find. Not sure the relevance of it and this being proof for it being “on purpose”. But that is the origin of the slowness.

        • @TangledHyphae
          link
          13 months ago

          I doubt that was intentional, they would likely want to hide that latency but the CPU time required to scan everything just is what it is.

          https://bsky.app/profile/filippo.abyssdomain.expert/post/3kowjkx2njy2b

          The hooked RSA_public_decrypt verifies a signature on the server’s host key by a fixed Ed448 key, and then passes a payload to system().

          It’s RCE, not auth bypass, and gated/unreplayable.