This week on #OpenSourceSecurity I talk to @ottok about his blog post about detecting an attack like xz in Debian
It's a fascinating conversation about a very complicated topic
There are things that could be detected, but this one would have been very very difficult
opensourcesecurity.io/2025/202…
Detecting XZ in Debian with Otto Kekäläinen
In this episode, Josh and Otto dive into the world of Debian packaging, exploring the challenges of supply chain security and the importance of transparency in open source projects.Josh Bressers (Open Source Security)
daniel:// stenberg://
in reply to Josh Bressers • • •Josh Bressers
in reply to daniel:// stenberg:// • • •@bagder
This is a good point
It's of course extra hard in the distro world as using release source tarballs is still super common
But building out of git instead of a release is probably a future end state
daniel:// stenberg://
in reply to Josh Bressers • • •yeah, in the #curl case I hope and wish that the people making the curl packages for distros (or build curl for other purposes) do the reproducible check - so that they know for sure that the one doing the curl releases didn't smuggle anything in. It also usually also requires that a few people do it and can trigger the alarm if they would find something odd.
At least we make it possible.
daniel:// stenberg://
in reply to Josh Bressers • • •Otto
in reply to daniel:// stenberg:// • • •daniel:// stenberg://
in reply to Otto • • •