You know how we laugh at users of some other OS’s for running random binary files they get from the Internet.
Well we do it as well. And instead of doing it on our personal machines, we do it on those servers that run our most critical infrastructure?
Here is a simple step by step plan that you can use to take over all Linux distributions’ master servers.
- Create a free software project. It can be anything at all.
- Have it included in the distros you care about.
- Create/buy a local exploit trojan.
- Create a new minor release of your project.
- Put your trojan inside the generated configure script
- Boom! You have now rooted the build machines (with signing keys etc) of every single distro.
Why does this exploit work? Because configure is essentially an uninspectable blob of binary code. No-one is going to audit that code and the default packaging scripts use configure scripts blindly if they exist.
Trojans in configure scripts have been found in the wild.
So not only are the Autotools a horrible build system, they are also a massive security hole. By design.
Post scriptum: A simple fix to this is to always generate the configure script yourself rather than using the one that comes with the tarball. But then you lose the main advantage of Autotools: that you don’t need special software installed on the build machine.