publicvoit,
@publicvoit@graz.social avatar

After basically the whole cloud was hacked (see list of related sources on https://karl-voit.at/cloud/ ), the first follow-up incidents went public caused by missing containment actions:

60,000 emails were stolen from 10 accounts
https://www.reuters.com/world/us/chinese-hackers-stole-60000-emails-us-state-department-microsoft-hack-senate-2023-09-27/

If you didn't understand until now: basically EVERYTHING at Microsoft got hacked and Microsoft can't (or won't) get rid of the intruders. Everything authenticated by Microsoft is tainted. Even auth.

publicvoit,
@publicvoit@graz.social avatar

If #Microsoft has any (internal) trust relation between the hacked #Azure certificates and #GitHub, we need to consider GitHub as hacked/tainted.

gegs,

@publicvoit something I've argued for many years now: cloud providers are a much bigger target than any individual company so they are a) bound to be infiltrated by nation states and their "subsidiaries" and b) it will be nearly impossible to purge such actors completely from cloud systems because the scope will be global. Still financial and other high risk institutions insist that cloud is better than owning and managing their own hardware. Like with AGW, people pay attention too late.

jonsnow,
@jonsnow@mastodon.online avatar

@gegs @publicvoit There's no such thing as "cloud", it's just someone else's computer 🤷

Here's a relevant cloud ad from a game released exactly a decade ago https://www.youtube.com/watch?v=9GP0KDuzgBc

gegs,

@jonsnow @publicvoit this has been a mantra of security experts since "cloud" became a thing. The earliest reference I can find is 10 years old: https://grahamcluley.com/cloud-someone-elses-computer/
The problem with that (now meme) being it doesn't convey the enormous risk that it poses to those making the decision on where to run a workload in a world run by people that have been taught that IT isn't core business. Instead of a being a smaller risk of a hack, it actually became near 100% risk of a hack.

publicvoit,
@publicvoit@graz.social avatar

@gegs @jonsnow Thanks for the reference. Added to my knowledge base!

timbray,
@timbray@cosocial.ca avatar

@gegs @publicvoit The first time I heard a super senior public-cloud security leader say "our assumptions have to include that at least one of our employees has more than one employer" was like 7 years ago. It's part of the conventional threat model these days. What makes you think that banks would be better at countering that particular threat than GCP or AWS?

timbray,
@timbray@cosocial.ca avatar

@gegs @publicvoit Why, yes, I did leave Microsoft out of that question.

gegs,

@timbray @publicvoit I've "not been a fan" of Microsoft since the early 90's but Azure is no better or worse than other big cloud providers so I don't see a reason to single them out in this case, but please elaborate.

gegs,

@timbray @publicvoit the question is quite precisely: what types of infrastructure have which associated risk. A cloud environment, when compromised, affects all its tennants at once. If you don't understand the implications, look up the history of the Gros Michel banana variety.

TheSauce,

@publicvoit

I hope your blog post gets the audience it deserves. A truly shocking litany of cloud disaster.

https://karl-voit.at/cloud/

publicvoit,
@publicvoit@graz.social avatar

@TheSauce Thanks. Help me spread the word.

There are too many business decisions pro-cloud that don't respect the full spectrum of risks.

E.g., investing in my own admins and their knowledge is worth nothing as it seems.

TheSauce,

@publicvoit

I keep thinking about all of the cloud "glitter" that gets tossed around as a distraction from the creaking monstrosity that lies behind the sales pitch.

Don't worry, your post is most certainly getting attention in my neck of the woods.

publicvoit,
@publicvoit@graz.social avatar

Now that I have migrated some of my hosts to #NixOS, I do have a bad feeling because of #Microsoft and most probably GitHub being hacked.

As mentioned on https://www.karl-voit.at/2023/09/12/nix/ the deep #GitHub dependency turns out to be a real downer for this OS.

#security #integrity

davidoclubb,
@davidoclubb@toot.wales avatar

@publicvoit I hear so many positive things about this on various podcasts (you probably know the ones), but I once tried it and couldn't even get to a useable desktop environment. That was a while back but I will stick with other OSs for now; and maybe if I go immutable I will try #Fedora first

raito,
@raito@nixos.paris avatar

@publicvoit While I agree with you, there are issues, I worry that your framing is flirting with baseless conspiracies as you seems to be ignoring that there are many safeguards in place to avoid letting GitHub corrupt the whole project.

Even if we didn't use GitHub, you have to understand that NixOS / Nixpkgs cannot force anyone we are consuming packages of to migrate somewhere else.

Either case, I think this is kinda FUD…

publicvoit,
@publicvoit@graz.social avatar

@raito I can't follow your accusation.

The facts show that Microsoft got compromised since at least 2021-04.

There is no claim by MS I know of that GH is completely separated from MS infrastructure that got compromised.

Current NixOS setups are pulling from GitHub which belongs to Microsoft. Yes, this can be changed but that's not the point here at all.

As far as I know, you can't protect yourself from a bad actor that has more or less full access to the GH infrastructure and backends.
1/2

raito,
@raito@nixos.paris avatar

@publicvoit

You are jumping from MSFT got compromised at time T to MSFT is still compromised and all GH repos are compromised with full capabilities for attackers. This is one of my accusation.

> As far as I know, you can't protect yourself from a bad actor that has more or less full access to the GH infrastructure and backends.

Assuming this without proof is, to be honest, conspiracy.
I don't like Microsoft neither, but this is ridiculous.

publicvoit,
@publicvoit@graz.social avatar

@raito The bad actors had years of more or less full access to MS infrastructure.

Actors that can pull off such an attack are perfectly well aware of what to do so that they keep access when the original attack vector is not available any more.

This is standard procedure for each intrusion attack.

Furthermore, in such a situation, the original bad actors can provide any sort of access to interested parties.

Yes, it's hard to digest but that's absolutely standard IT sec reasoning.

publicvoit,
@publicvoit@graz.social avatar

@raito Furthermore, it's not just me who tries to explain the implications. Please read other sources that quote various security experts and how they judge the impact of this incident.

Assuming that nothing happened to GH is understandable from a project's point of view (effort! trust!) but nothing more than wishful thinking without any proof.

In IT sec, you always(!) assume the worst case just because of that. You can never be sure otherwise.

lispi314,

@publicvoit @raito Does NixOS not independently sign its updates and use checksums of the aggregate repo contents (not trusting git's mostly sha1-only setup) like Guix?

If it does those two things, there's very little a malicious host could do other than denial of service.

If it doesn't then uh yeah, it's broken and really should fix that post haste.

publicvoit,
@publicvoit@graz.social avatar

@raito 2/2

Yes, there is no proof or indication that anything happened to any GH repository yet. 👍

However, in IT security, you don't rely on lucky guess. A compromised network is still a compromised network and needs to be restarted from a clean status.

It doesn't look like MS is going to setup major parts of their infrastructure to introduce trustworthy hosts again.

So where's the FUD in terms of reasoning?

raito,
@raito@nixos.paris avatar

@publicvoit

> So where's the FUD in terms of reasoning?

> It doesn't look like MS is going to setup major parts of their infrastructure to introduce trustworthy hosts again.

I think you answered yourself very well.

In IT security, lucky guess are not primitives to build threat models. Hypotheses, assumptions, economics, politics, technical measures and careful analyses are.

What you are doing is just lucky guessing that MSFT didn't do any form of "reasonable" due diligence.

publicvoit,
@publicvoit@graz.social avatar

@raito After years of having a (potential) state actor in the back-end of MS, I'd be very interested in your assumptions that they really did not perform lateral movements and expand to linked networks.

No tech measures can mitigate or contain such an attack that lasted for so long in retrospect.

From an politics/economic perspective, we agree. We see what the economic decisions were already.

But that is strongly orthogonal to IT sec reasoning. Trade-offs won, as usual. But no proof.

raito,
@raito@nixos.paris avatar

@publicvoit But then, assuming the level of catastrophe you are describing.

What value is there in using a modern computer? NixOS/Nix is not the only thing affected. systemd is in GitHub, systemd developers are from Microsoft, etc, etc.

What is the usable advice we can get out of your whistleblowing?

publicvoit,
@publicvoit@graz.social avatar

@raito I'm not a whistleblower at all! I just quoted articles published by MS & independent sources.

I never said that we should stop using NixOS, systemd, ...

We just need to be aware that there is no such thing as a trustworthy cloud infrastructure most probably anywhere except you deal with it yourself to some degree.

All projects that rely on a pot. compromised infrastructure need to invest in mitigation measurements against malicious infrastr. which wasn't discussed so far AFAIK.

raito,
@raito@nixos.paris avatar

@publicvoit

> I never said that we should stop using NixOS, systemd, ...

> We just need to be aware that there is no such thing as a trustworthy cloud infrastructure most probably anywhere except you deal with it yourself to some degree.

Right, but what you are saying is that NixOS is particularly reliant on GitHub whereas everyone is reliant on GitHub so…

raito,
@raito@nixos.paris avatar

@publicvoit

> All projects that rely on a pot. compromised infrastructure need to invest in mitigation measurements against malicious infrastr. which wasn't discussed so far AFAIK.

We already touched base on some obvious mitigation measures we all enjoy thanks to the concept of Git repositories.

We have many more because of how nixpkgs works, but I admit I am slightly annoyed because you seem to be ignoring them and you didn't contact any expert matter, I assume?

lispi314,

@publicvoit It doesn't have anything like Guix's fallbacks to (among other things) the #SoftwareHeritage archive?

That's all kinds of unfortunate.

ctietze,
@ctietze@mastodon.social avatar

@publicvoit I love that you're keeping such a long historic list!

Reminds me of @mjtsai's Review Rejections at https://mjtsai.com/blog/tag/rejection/ or https://web3isgoinggreat.com/ :)

(It's also horrible that the list could become so long.)

publicvoit,
@publicvoit@graz.social avatar

@ctietze @mjtsai Thank you for the links, I've added a section at the bottom of my cloud page to link to similar lists. 👍

mayuraviva,
@mayuraviva@shelter.moe avatar

@publicvoit Offline and local apps are still preferable even in 2023.

zazzoo,

@publicvoit The mass uptake of Microsoft's mail services has always rung alarm bells for me. Azure, particularly their 365 suite platform is too rich a target not to be hacked. Also, Azure is a late-comer. I've always felt it was a panicked rush to market.

When asked, I have always advised people to stay clear of any of it.

MrManor,

@publicvoit
And still leadership and several colleagues at one of the Danish Regional Hospital services insist on having office data and mail in MS cloud services. But of course no patient data will leak over... 🙄

AngelaScholder,
@AngelaScholder@mastodon.energy avatar

@publicvoit One reason why I think it's unacceptable for our government and other autorities to use Azure or AWS services.

We used to have the KeePass database stored in webspace with our ISP (until KPN assimilated them).
It's now on a NAS, as is all our data, but securely backed up in the cloud (on in NL, one in Germany).
The cloud storage is used for sharing things, and thus as off-site backup (encrypted) for important data.

It's bad enough that basically for a mobile, the only real >2

publicvoit,
@publicvoit@graz.social avatar

@AngelaScholder You could think of using Syncthing as it doesn't require external cloud hosts.

AngelaScholder,
@AngelaScholder@mastodon.energy avatar

@publicvoit All our own internal syncing is done via the NAS systems. So the personal data is synchronised between the desktop, netbook, and Ubuntu laptop.

The netbooks and Ubuntu laptop have a synchronised copy of the KeePass database. This to prevent an issue if our home connection would be offline if we are away.

malg,

@publicvoit there are alternatives to GitHub - https://codeberg.org/ for example, or self-host https://about.gitea.com/

StevenBarnhart,

@publicvoit @matthew_d_green I don’t get how you jump to that conclusion based on the facts presented.

publicvoit,
@publicvoit@graz.social avatar

@StevenBarnhart @matthew_d_green If I was not able to explain it in that short Mastodon message, read the related parts on my blog article https://karl-voit.at/cloud/ and follow the independent sources listed there.

It's not that this is just my personal reasoning. Not at all.

StevenBarnhart,

@publicvoit @matthew_d_green “On July 3, Microsoft blocked usage of the key for all impacted consumer customers to prevent use of previously-issued tokens.”

publicvoit,
@publicvoit@graz.social avatar

@StevenBarnhart @matthew_d_green Years of access to the inner workings of Microsoft by a presumed state actor and you think that they did not think of creating their own certificates or even implant backdoors? 🤔

purusov,
@purusov@mastodon.social avatar

@publicvoit combine this with implications outlined in Ken Thompson’s “Reflections on trusting trust”, and the whole thing looks absolutely terrifying

jrballesteros05,

@publicvoit I haven't had any microshit account but I changed my job and then I have the job account there. I know I don't have anything personal there but I don't know what kind of personal data the company I work for is there. I always been very sceptical about moving everything to the fucking cloud and I have always been very critical about that.

Something I hate most it's people who don't have any fucking idea about anything telling us that we should move everything there.

publicvoit,
@publicvoit@graz.social avatar

@jrballesteros05 It's not just services by Microsoft. It's the whole Azure and all of its customers we have no idea of. Including GitHub.

blausand,
@blausand@chaos.social avatar

@publicvoit
H.A.B.E.N S.I.E D.A.Z.U N.O.C.H F.R.A.G.E.N ?

synlogic,
@synlogic@toot.io avatar

@publicvoit good chance the decision to host StateDept emails on MS cloud was made during Trump admin. no specific knowledge of that but smart way to bet. man is a Russian traitor trying to sabotage the US every way he can get away with

fedops,
@fedops@fosstodon.org avatar

@publicvoit comments from our security and IT manglement: "we weren't affected, msft said so."

I'd tear my hair out, but honestly...

rowmyboat,
@rowmyboat@glammr.us avatar

@publicvoit wow, love that my R1 university has gone whole hog into Microsoft for the university’s digital infrastructure

tehstu,
@tehstu@hachyderm.io avatar

@publicvoit as a layman, is it safe to assume consumer services are affected (e.g., OneDrive)?

publicvoit,
@publicvoit@graz.social avatar

@tehstu Oh absolutely.

stdevel,
@stdevel@chaos.social avatar

@publicvoit We really need an user-friendly alternative to #GitHub. Love seeing that both @forgejo and #GitLab work on ActivityPub support. Can't wait to try it out.

batalanto,

I have really been baffled by the widespread loyalty to Microsoft by the #FreeSoftware community. I wonder if you have the answer… is it really user-friendliness that causes FOSS devs to embrace #Github with such strong loyalty as to ignore marginalization of people communities excluded by MS? I think of developers as quite technical so I would not have thought user-friendliness is that critical to a forge. #askFedi

kikebenlloch,
@kikebenlloch@mastodon.social avatar

@publicvoit Fuck me, I had no idea, the volume of this shitload is unreal.

adiz,

@publicvoit Wow, that really sucks for users of Microsoft products and services. Oh, well! ​:panopticon:​​:gnutroll:​

publicvoit,
@publicvoit@graz.social avatar

@adiz This does not only affect #Microsoft and their direct services.

This also affects all customers of Azure and their services.

You don't know what services you're using whose back-end is hosted in #Azure.

lispi314,

@publicvoit @adiz Services shouldn't really be trusted as far as one can throw them though.

If their computation cannot be (and isn't by default) verified locally, they should be avoided entirely.

coolboymew,

@publicvoit Get on the cloud they said, it's a good idea to have everything in one place they said

yaeunerd,

@publicvoit Could you go a little bit more in depth about:

> Microsoft can't (or won't) get rid of the intruders

P.S. I must admit I didn't read your article on karl-voit.at; was a little bit too long sorry 🙏

publicvoit,
@publicvoit@graz.social avatar

@yaeunerd Sure.

In simple words: #Microsoft lost one of their master keys to unlock very important parts of their cloud. This connects to all MS services that do authenticate by MS which includes most #Windows setups as well.

This happened long time ago, some people think it was the Chinese.

They were able to implant #backdoors, self-made keys, ... all over the place.

In order to fix that, MS would need to kill all their connected hosts and start from scratch. It's obvious why they don't.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • microsoft
  • DreamBathrooms
  • everett
  • InstantRegret
  • magazineikmin
  • thenastyranch
  • rosin
  • GTA5RPClips
  • Durango
  • Youngstown
  • slotface
  • khanakhh
  • kavyap
  • ngwrru68w68
  • tacticalgear
  • JUstTest
  • osvaldo12
  • tester
  • cubers
  • cisconetworking
  • mdbf
  • ethstaker
  • modclub
  • Leos
  • anitta
  • normalnudes
  • megavids
  • provamag3
  • lostlight
  • All magazines