• @TangledHyphae
    link
    0
    edit-2
    8 months ago

    The slowness is on purpose? To help identify the sshd in question to the attacker which nodes are compromised? What reason(s) could there be?

    • @[email protected]
      link
      fedilink
      English
      68 months ago

      He’s talking about Debian’s slowness in getting new versions to stable, and how the meme ignores security backports.

      • @TangledHyphae
        link
        18 months ago

        Ohh that makes way more sense, thanks. I haven’t used Debian in like 10 years but it was obviously the same back then too.

    • @mumblerfish
      link
      28 months ago

      If the above decides to continue, the code appears to be parsing the symbol tables in memory. This is the quite slow step that made me look into the issue.

      That is from the original find. Not sure the relevance of it and this being proof for it being “on purpose”. But that is the origin of the slowness.

      • @TangledHyphae
        link
        18 months ago

        I doubt that was intentional, they would likely want to hide that latency but the CPU time required to scan everything just is what it is.

        https://bsky.app/profile/filippo.abyssdomain.expert/post/3kowjkx2njy2b

        The hooked RSA_public_decrypt verifies a signature on the server’s host key by a fixed Ed448 key, and then passes a payload to system().

        It’s RCE, not auth bypass, and gated/unreplayable.