removed by mod
fedilink
1.62K
@[email protected]
link
fedilink
English
332Y

“given enough eyeballs, all bugs are shallow” …but sometimes there is a profound lack of eyeballs.

Sockenklaus
link
fedilink
English
222Y

That’s exactly the problem with many open source projects.

I recently experienced this first hand when submitting some pull requests to Jerboa and following the devs: As long as there is no money funding the project the devs are trying to support the project in their free time which means little to no time for quality control. Mistakes happen… most of them are uncritical but as long as there’s little to no time and expertise to audit code meaningfully and systematically, there will be bugs and these bugs may be critical and security relevant.

Rentlar
link
fedilink
English
62Y

For the human-hours of work that’s put into it it’s very expensive. I put in translations, highlighted bugs, put in a Jerboa fork to help mitigate issues with the 0.18 Lemmy upgrade… if I were to do this kind of thing for work I’d bill 25CAD per hour at the very minimum.

Freeman
link
fedilink
English
92Y

Even when you do have time. There have been “researchers” submitting malicious prs and when caught just act like it’s no big deal. Even had an entire institution banned from submitting prs to the Linux kernel.

https://www.bleepingcomputer.com/news/security/linux-bans-university-of-minnesota-for-committing-malicious-code/

@[email protected]
link
fedilink
English
92Y

Well, i think in most of those big incidents, people got caught. That means the concept kinda works well?

Regarding the earlier comment: I think companies just started to figure that out. They/You can’t just take free libraries databases etc… If you’re big tech company you better pay a few developers or an audit to make those libraries safe. This is your way of contributing. Otherwise your big platform will get hacked because you just took some 15 year olds open source code.

@[email protected]
link
fedilink
English
72Y

Selection bias though. We don’t know how many have not yet been caught.

Freeman
link
fedilink
English
42Y

agree. Hell i wouldnt be shocked if some corporations or even nation-state (ie: NSA) actors do this, in a much better/more professional manner to ensure things like…backdoor access.

@[email protected]
link
fedilink
English
22Y

No hypothesis needed https://en.wikipedia.org/wiki/EternalBlue can’t have been a one-off either.

Freeman
link
fedilink
English
32Y

Yeha that was my though. But more a dedicated program to do similar with large FOSS projects.

They also have hardware/supply chain intercept programs to install back doors in closed source appliances (ie: Cisco firewalls)

So something similar but dedicated to open source PRs.

@[email protected]
link
fedilink
English
22Y

At least there have been attempts to subvert open standards for cryptography through the standards process. And occasional suspicious pull requests in critical places - I assume those are done through cut-out proxies so we don’t know who tried.

@[email protected]
link
fedilink
English
2
edit-2
2Y

Yeah. I think the discussion is kind of nonsensical and a tautology. Nothing in life is 100% safe, if foss or not. And we don’t know what we don’t know. We got a few cases where we know something got intercepted after people tried to do malicious PRs or intercepted network equipment.

Create a post

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.
  • 1 user online
  • 828 users / day
  • 79 users / week
  • 904 users / month
  • 2.75K users / 6 months
  • 0 subscribers
  • 2.97K Posts
  • 31.5K Comments
  • Modlog