• chameleon@kbin.social
      link
      fedilink
      arrow-up
      42
      arrow-down
      1
      ·
      2 years ago

      Won’t help here; this backdoor is entirely reproducible. That’s one of the scary parts.

      • OsrsNeedsF2P@lemmy.ml
        link
        fedilink
        arrow-up
        27
        arrow-down
        3
        ·
        edit-2
        2 years ago

        The backdoor wasn’t in the source code, only in the distributed binary. So reproducible builds would have flagged the tar as not coming from what was in Git

        • chameleon@kbin.social
          link
          fedilink
          arrow-up
          27
          ·
          2 years ago

          Reproducible builds generally work from the published source tarballs, as those tend to be easier to mirror and archive than a Git repository is. The GPG-signed source tarball includes all of the code to build the exploit.

          The Git repository does not include the code to build the backdoor (though it does include the actual backdoor itself, the binary “test file”, it’s simply disused).

          Verifying that the tarball and Git repository match would be neat, but is not a focus of any existing reproducible build project that I know of. It probably should be, but quite a number of projects have legitimate differences in their tarballs, often pre-compiling things like autotools-based configure scripts and man pages so that you can have a relaxed ./configure && make && make install build without having to hunt down all of the necessary generators.

          • flying_sheep@lemmy.ml
            link
            fedilink
            arrow-up
            10
            ·
            2 years ago

            Time to change that tarball thing. Git repos come with built in checksums, that should be the way to go.

    • Daniel Quinn@lemmy.ca
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 years ago

      Why didn’t this become a thing? Surely in 2024, we should be able to build packages from source and sign releases with a private key.

      • Natanael@slrpnk.net
        link
        fedilink
        arrow-up
        5
        ·
        2 years ago

        It’s becoming more of a thing but a lot of projects are so old that they haven’t been able to fix their entire build process yet