(and fail?)
Konstantin Ryabitsev
Linux Security Summit
Vancouver, 2023
https://slides.com/mricon/backdoor-and-fail
I live in Montréal, Québec
Linux admin since 1997
(formerly) head of LF Infrastructure Security
now just head of Core IT Projects team
in charge of kernel.org for the past 10+ years
keeper of grounds and keys
Did anyone ever, you know, approach you with some shady offer?
– Common Question
Price $149 /mo
One zero-day
Two backdoors
7-day turnaround
Plausible deniability
Price $299 /mo
NEW
Three zero-days
Three backdoors
7-day turnaround
Plausible deniability
Price $599 /mo
Up to five zero-days
Five backdoors
3-day turnaround
Plausible deniability
On parle français, se habla español, 厕所在哪里
Please don't contact me. It will be a very short awkward conversation and then I'll have to figure out how to contact both the FBI and the CSIS.
A hidden vulnerability
Installed by the victim
i.e. not added by attacker after a compromise
Allowing remote access
Or elevating privileges
Or exfiltrating sensitive info
encryption keys
or secret docs
This is not "How to Backdoor Linux for dummies."
Check if you're in the right talk.
For every powerful state-level actor, there is another equally or more powerful state-level actor who is paying someone to watch all Linux commits
It’s like building a shared arsenal of powerful weapons that anyone can launch
For every powerful criminal syndicate there is another powerful criminal syndicate
They all keep money in the same Swiss banks
If you wait long enough, someone will backdoor the kernel for you.
– Kees Cook [citation needed]
Just wait until a critical vulnerability is fixed — it's not like manufacturers patch their kernels or anything.
– Greg KH [citation needed]
(c) user ebygomm on Flickr