Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Supply chain attacks become a lot easier to pivot on. Put some Spectre code in a npm or RPM package, then wait to see what pops up. So much stuff is sudo curl pipe bash these days that the Spectre threat is real.

All the more reasons to run your own servers and compile your own binaries. Like we used to do.



Why do you need Spectre for that? Just install backdoor. It's not like someone runs npm from restricted user.


I thought it was standard practice for framework package managers to run as non privileged users and install binaries in local dirs.


Never saw that. You're typing npm install and npm runs under your current user (probably not root, but who cares about root when valueable data belongs to you, not root) and runs any package install scripts it just downloaded from npm website. There's no separate user to run npm, at least in default installs.


You mean “compile your own binaries” using code which you downloaded without auditing, just like NPM? That’s actually what we used to do; blaming NPM is both reflecting a misunderstand of the problem and blaming the update system which means you can fix a problem orders of magnitude faster — the half-life of random tarballs people used was much longer.


Who said without auditing? There are a plethora of signing and hashing mechanisms one can use to verify a package's authenticity.

Compiling once from a tarball and reusing that can definitely reduce the number of times you would need to trust something from a third party.


You are aware that NPM already does that, right? It’s even safer because the network requires immutability so there’s no way to trojan a package without shipping a new version for everyone to see.

The real problem is why I mentioned auditing: the attacks we’ve seen over the years have been updates from maintainers who followed the normal process. Auditing is the most reliable way to catch things like that because the problem isn’t the distribution mechanism but the question of being able to decide whether you can trust the author.


Put some Spectre code in a npm or RPM package, then wait to see what pops up.

This is fucking scary. If it's a package used by Wordpress you could end-up with 30% of the web open to an attack.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: