Linux Firmware Update Utility Fwupd Will Use Zstd Compression for Future Releases

The devs are also considering enforcing signed commits in an attempt to prevent supply chain issues like the XZ backdoor.

Edit: note for downvotes: I understand some of you disagree with the need for a switch. However, are you downvoting the news itself (i.e. shooting the messenger?)

  • Responsabilidade
    link
    fedilink
    229 months ago

    I think it solves nothing, cause it’s not primarily a XZ issue itself, but some bad actors that infiltrate into the community for years to finally use his credibility to upload a backdoor. Every single package is vulnerable to this kind of attack and has little we can do to completely avoid it

    Of course we have to make the best moves to prevent this happening again, however it’s not a simple “I’ll use X instead of Z” (see what I did here?!), cause both X and Z may be doomed with this shit anytime

    • @[email protected]
      link
      fedilink
      59 months ago

      One good thing about zstd is that the main developer is full-time employed to work on it. Alas he’s employed by meta to do that… But it’s likely harder to social engineer your way into that project

      • @bigmclargehuge
        link
        49 months ago

        This is definitely a huge unsung benefit of having larger corperations get their fingers into FOSS projects. Not just the funding, which is great, but the literal job security. Good luck bullying a meta or google employee into giving over control to a stranger.

    • @[email protected]OP
      link
      fedilink
      49 months ago

      The article states reasons which aren’t limited to what happened. I understand and agree with your sentiment about the supply chain issue being something that could happen anywhere - those were my initial thoughts too.

      The reasons for shifting are related to speed, other mainstream software already having made that switch years ago (pre incident), and unfortunately… More robustness in terms of maintainers.

      Open source funding and resilience should be mainstream discussions. Open source verification and security reliability should be mainstream discussions: here’s a recent mastodon thread I found interesting:

      https://ruby.social/@getajobmike/112202543680959859

      However, people switching from x to z (I did see what you did there) is something that is going to happen considering the other factors listed in the article that I summarized above.

    • @[email protected]
      link
      fedilink
      69 months ago

      Here, it’s libzstd.so, libc and glibc, and libzstd only libc and glibc. What do you mean? At first I thought you were implying an liblzma dependency, but there’s no such thing, at least can’t see it.

      • @[email protected]
        link
        fedilink
        59 months ago
        % libtree /usr/bin/zstd
        /usr/bin/zstd 
        ├── libz.so.1 [ld.so.conf]
        ├── liblz4.so.1 [ld.so.conf]
        └── liblzma.so.5 [ld.so.conf]
        % lsb_release -a
        No LSB modules are available.
        Distributor ID: Debian
        Description:    Debian GNU/Linux 12 (bookworm)
        Release:        12
        Codename:       bookworm
        %
        
  • Gianni R
    link
    fedilink
    English
    49 months ago

    Aside from the backdoor (which is a moot point when talking about zstd anyway), there are a number of other very good reasons to use ZSTD.

    • @[email protected]OP
      link
      fedilink
      English
      2
      edit-2
      9 months ago

      As with all definitions, there is a gray area where people will have different boundaries on exact meanings. To you - a supplier relationship needs an explicit payment, which is a fair definition.

      However, the more widely used definition that most people, including me, refer to, is not necessarily focused on the supplier, but on the supply - what we use in our toolchains is a supply - regardless of how it was obtained.

      When there is an issue in a trusted supply, even if it was not a commercial relationship (a prerequisite by your definition), it is a supply-chain attack by the more widely used definition.

    • Possibly linux
      link
      fedilink
      English
      29 months ago

      Brodie is that you?

      Anyhow I would argue that it is indeed a supply chain but you still need to be respectful of the volunteers. The article seems to mostly talking about proprietary software anyway.

  • @[email protected]
    link
    fedilink
    1
    edit-2
    9 months ago

    I thought major software devs used signed commits. I don’t have that much git experience and I have everything gpg signed even since the first repo I did.

    This makes me question a lot of software.

    • @[email protected]OP
      link
      fedilink
      69 months ago

      They do. They did. What do you do when a ‘good guy’ is really a bad guy? Happens outside of software too. Someone inserts themselves into an organization while secretly working against its interests.

      Here’s a good summary. However, you should read a few articles - plenty have been going around, including on Lemmy.

  • @[email protected]
    link
    fedilink
    19 months ago

    As did Fedora for RPM packaging since 31. Good progress, but signed commits have nothing to do here I think.