Debian Project Servers Compromised 666
Sean was one of many to pass along
the bad news
from the debian-announce mailing list: "Some Debian Project machines have been compromised. This is a very unfortunate incident to report about. Some Debian servers were found to have been compromised in the last 24 hours. The archive is not affected by this compromise! In particular the following machines have been affected: 'master' (Bug Tracking System), 'murphy' (mailing lists), 'gluck' (web, cvs), 'klecker' (security, non-us, web search, www-master). Some of these services are currently not available as the machines undergo close inspection. Some services have been moved to other machines (www.debian.org for example). The security archive will be verified from trusted sources before it
will become available again." They were going to announce 3.0r2 this morning; they've checked it and it's unaffected but obviously they're still postponing that release.
It's good to see that they are holding everything (Score:1, Insightful)
however, it does remind me of the gnu ftp cracking incident a while back...
(although that was a known exploit, and this seems to be login/password being compromised)
Re:...not the archive. (Score:2, Insightful)
Re:Not on debian-announce archive (Score:2, Insightful)
How long will it take? (Score:4, Insightful)
Bonus point for Debian (Score:2, Insightful)
Here we can see the strength of such projects, as in this [slashdot.org] recent kernel story.
Re:How long will it take? (Score:5, Insightful)
Password stealing is pretty OS independent.
So this compromise, whilst undenyably bad, isn't really going to show much about Debian, or Windows.
Makes you wonder (Score:5, Insightful)
As someone who works with networking security, I know lots of business servers get compromised regularly. Everyone hides it because it's embarassing for a business.
This makes you wonder how often other 'critical systems' get compromised, and get fixed without any public reports. Government computer systems get regularly compromised after all. But I'm sure so do vital Microsoft, IBM, systems, etc. Windows Update, anyone?
Re:Digital Signing of Packages? (Score:1, Insightful)
Just don't do it kids.
I do wonder though, what with the "professional" level of the unsuccessful attack on linux Bitkeeper, and so on, whether there are more serious forces than the usual crop of script-kiddie losers currently targetting open-source.
Actually, I think a good code-audit is healthy once in a while. Open Source is made stronger and stronger by attacks. Hopefully this will be the final death knell for md-fucking-5.
Re:It's good to see that they are holding everythi (Score:1, Insightful)
-JohnF
Re:How long will it take? (Score:1, Insightful)
In other words, "here is a taste of your own medicine"... bitter isn't it?
Grumble, grumble (Score:5, Insightful)
Comment removed (Score:4, Insightful)
Re:Digital Signing of Packages? (Score:5, Insightful)
The person operating the non-networked signing machine still needs to be sure that what-it-is-that-they-are-signing is what-it-is-supposed-to-be.
Now how does digitial signing on a non-connected machine help you know the source wasn't tampered with?
Re:How in the world... (Score:5, Insightful)
They will when it's known. They felt it more important to announce what's going on immediately than to wait until there were details to announce. Part of Debian's social contract is "we will not hide problems"; this announcement and those that will follow as more is known demonstrate this policy in action.
Sign, sign, sign, sign. (Score:5, Insightful)
Re:OpenBSD (Score:5, Insightful)
I also think that Gentoo would have prevented this tragedy.
Not really. The vast majority of break-ins are through misconfiguration or human error. Gentoo, OpenBSD, nor anything else, can prevent these factors. I would be very surprised if this was due to a security hole or vulnerability. More likely someone wasn't secure enough with their SSH keys or something like that.
A sign of things to come (Score:3, Insightful)
Open-source projects are not immune to attack and they are going to start feeling some of the pain experienced by other big targets like Microsoft. In the beginning it could be really bad because unless you're being attacked seriously all the time then you may not even realize where your vulnerabilities are.
This is a wake-up call to all "open" projects. Systems that are in use by a large number of people need to be protected better. Sure, this may have been a password compromise but the system should have been secure enough that some low-level user account compromise can't cause serious damage. And the high level accounts should never, ever have a password compromise. This needs to be treated in the same way big business does. Protect the customers, otherwise you may lose them.
This made me start thinking... Has Redhat ever been compromised? That'd be a reason for going with a commercial distro if the free distros can't get their act together. (I've been a Debian user for many years by the way)
Re:Makes you wonder (Score:2, Insightful)
I think honesty ALWAYS has a payback, sooner or later. It's maybe sound absurd, but people trust you more, if you admit your mistakes, even worst ones.
Re:OpenBSD (Score:1, Insightful)
Re:How in the world... (Score:4, Insightful)
Why should you? They were cracked. The bad thing has already happen, so there is no easy way out. However, there *is* a *right* way out. And that includes telling people what they know as quickly and effectively as they can. Too much information too early can be a bad thing.
In short: have a little faith that they're dealing with this correctly, unless you've run a massively-used public box for years without a single compromise.
-Rob
Double Standard on /. (Score:1, Insightful)
Linux box gets compromised: "Oh, this is so unfortunate. Oh dear. Can I have a moment of silence ?"
Re:A sign of things to come (Score:5, Insightful)
People *already* know that OSS is not perfect, and they have known for years. People already know OSS is not immune.
But, more importantly, those same people know *nothing* is immune. Not MS, not Linux, not BSD, not (even!) MacOS, not DOS. *All* systems can be hacked.
What *really* matters is the attitude to security.
- A lot of the larger OSS projects care deeply about security. If a security bug is found, it's usually fixed very fast, and the fix will be peer reviewed.
- They openly admit all flaws and bugs. Because of this, OSS *appears* to have more bugs.
Do you see Microsoft admit all their bugs? I don't think so. MS hides a lot of bugs, pretending that they don't exist and that Windows is perfect.
Too bad all the MS zealots and anti-OSS/anti-Linux zealots use that to "proof" Windows is more secure than Linux/OSS/whatever. The number of bugs is *not* an accurate indication of security.
Linux zealots are only a small minority of the community. If you think they represent the entire community then you're wrong, just like so many people out there.
"Has Redhat ever been compromised?"
Maybe. If they haven't then it's because of pure luck.
Re:apt (Score:2, Insightful)
Re:How in the world... (Score:2, Insightful)
That sounds like a great idea for a home machine, or even a dedicated box.
But if you're trying to maintain an open collection of machines like Debian is, where developers from all over the world can connect from wherever they are (dialup/dhcp/cable/travelling) you can't easily restrict their IP.
It's like saying a mail server should only accept mail from ip a.b.c.d - it just doesnt work.
Re:OpenBSD (Score:5, Insightful)
It's not about Linux vs Microsoft, it's about Open Source vs Microsoft.
Heck, maybe even Unix vs Microsoft. Because then we can use MacOS X to beat all the Windows zealots.
Would Microsoft announce that it was compromised? (Score:5, Insightful)
Transparency is a prerequisite for trust.
Honestly... (Score:0, Insightful)
Everyone here knows if windowsupdate.microsoft.com had been compromised, people would be droning on about how it's some sort of illustration of Microsoft's security. All the "+5 Funny" trolls would be out in full force, and everyone would try to act like some sort of security expert.
Here, we have another OSS break-in (remember GNU?), and people can only offer excuses and justifications. It's a double standard I can't not notice. Sorry to spoil it, but there is nothing wrong with pointing out that this has yet to happen to Microsoft's server. And you know people try harder against them!
Security to you apparently means "everyone gets compromised once in a while." Wow. If that's the security mentality going around in the Linux community, expect more compromises as Linux grows more popular, and expect more excuses as people try desperately to avoid the "haha, told you so" laughs from people who have pointed out all along that nothing is 100% secure, and that all operating systems--especially Linux--have flaws, holes, buffer overflows, and so forth.
Re:Double Standard on /. (Score:5, Insightful)
Windows Box Compromised: Someone exploited a flaw.
Linux Box Compromised: Insecure password.
or, if it IS due to a flaw exploit...
Linux: Box compromised because machine wasn't carrying latest patches.
Windows: Box compromised even though machine was updated last week.
Linux: Exploit found. Exploit gets fixed. Publically. Usually the same month - with a temp-patch available within the week.
Windows: Exploit found. Exploit gets fixed. Eventually. As a part of the next service pack. Newsgroups, Slashdot and third-party sites suggest workaround. MSKB just says "Problem is under investigation"
Oh, and there's always...:
Windows exploited:
Linux exploited:
(Or sending "Use a good password" memos around the office, stating that if an organisation like Debian can be compromised by a password, then Joe Average in accounts hasn't got a hope in hell if his password it the cat's name.)
Tempered Arrogance (Score:5, Insightful)
All three of my Linux boxes run Debian; this latest security breach will not change that.
However, I hope this type of incident tempers the often-strident elitism of the free software camp. My faith in Debian continues because they caught this problem and openly announced it; my concern is that the lack of consequences will make people assume that this was a false alarm or unimportant incident.
Free software suffers from "victory disease" -- an assumption that, based on past success, future success is guaranteed. Because free software has proven reliable and secure, the concensus seems to be that it will always be so.
Pride comes before the fall, as they say. Attempted infiltrations of the Linux source code control system and breaches of security at Debian suggest that we need to be cautiously optimistic, not naively myopic.
Common sense snippets (Score:5, Insightful)
218 posts and some rare appropriate reactions.
Regards,
JDif
Re:This is a major problem (Score:2, Insightful)
Re:SO MUCH FOR YOUR SECURE OPERATING SYSTEM (Score:4, Insightful)
Re:Everything's a tradeoff (Score:2, Insightful)
The only way real security can be obtained is by pulling the plug.
Re:Double Standard on /. (Score:3, Insightful)
No,
Re:Why Gentoo is Better (Score:3, Insightful)
That and why you don't bleep want to get bleeping flamed and yet you bleep bleeep bleep bleepbleep didn't bother reading the article before posting.
Re:Digital Signing of Packages? (Score:3, Insightful)
The point of the idea would be that breaking into the server wouldn't allow you to modify packages - you'd need a developer's private key to sign it too, or get the developer to sign a bad package.
When it's found security is compromised, all that is needed is to revoke the developer's key. If apt-get is changed so that it checks for revokations before installing the package, the damage will be much less.
The case of a malicious developer is somewhat harder to handle though, since only somebody with the private key can issue a revokation cert. But this could be quite easily worked around, like forcing every developer to submit a revokation certificate for safekeeping. Then if the developer was found to be malicious the revokation could be sent to the key servers without having the private key.
Re:How long will it take? (Score:3, Insightful)
Re:Debian - maybe not so great (Score:4, Insightful)
What does this have to do with the "quality" of Debian? AFAIK, the vulnerability that lead to the compromising hasn't been revealed yet. I could have been something as simple as a guessed password.
From James Bond... (Score:2, Insightful)
Once is the gnu/ftp compromise mentioned here on Slashdot.
Twice is this incident.
The third time should convince us all that someone is out to get Open Source specifically! Tighten up your security, gentlemen! The gloves are off and someone out there is trying any means, fair or foul, to discredit Open Source.
Re:apt (Score:5, Insightful)
I do have to say that I am still happier with Debian broadcasting this incident as loudly as possible rather than the corporate tactic of hushing it up (I know of a few companys that have done just that). Thanks for the open honesty Debian!
password (Score:4, Insightful)
Then, have your password stolen, and oh shit, you're compromised. It's not about the OS being insecure, it's about a lost password. NOTHING can protect against this, short of one instance I heard where updates required 3 user passwords (from 3 users), but what a pain that would be.
Absolute security is a fallacy (Score:2, Insightful)
You cannot achieve perfect security. It is impossible. You can only aim for it.
The Debian project will not only retain their credibility, but I'd suggest they'll improve it by
What's with all the trolls lately? (Score:5, Insightful)
In case you haven't noticed, Slashdot has, and always has had, an editorial bias towards OSS, and against Microsoft. So do the bulk of the Slashdot readership. This is nothing new. This is a geek website, and the plain truth is, most people who call themselves geeks don't just sit blindy clicking away in Windows all the time. We like to play with our toys, we like experiment, we like to open it up and see what makes this baby tick. With something like Linux, you can do this. With Windows, you can't. Those are simply the facts. So of course people here will look upon OSS in a more favorable light.
Yet today, we have comments such as "hysterical ranting of the Debian wackos" being modded up as Insightful and Interesting? Hello people, that's called flaming. If it was more subtle, as yours is, it's called trolling. Walking into a Britney Spears fan club meeting and shouting "Britney SUCKS!!!" is also an example of trolling/flaming. So when you come to a website with an obvious and open slant towards something, and constantly try to point out that slant...
Well, I guess I just don't see why you're bothering. I mean really. If you really think the OSS community is full of shit, why on Earth do you come to one of their main websites/blogs/message boards/whatever?
As far as a double standard goes, I honestly don't get your point. Slashdot has never had a policy of reporting every single hack of a Windows-based system. However, pretty much every major OSS hole/exploit/hack gets a story here. Considering how many Windows machines there are in the world, you'd think there would be a lot MORE exploiting going on (hey, I'll use the "Linux would get hacked too if it was on 90% of computers" line for a change). And yet, we hear more often about Linux machines being compromised.
Well, except for things like Code Red/Nimda/Slammer/Blaster/etc, which, I'm sorry, but you'd have a hard time convincing me that this DOESN'T prove the case of Microsoft being just slightly less secure than Linux. Or else we'd be seeing Apache worms flooding the Internet on a daily basis, because "Microsoft only gets hacked because it's on 90% of computers", right?
Oh, and for the record, password compromises are OS-independant, and have nothing (read: zero) to do with the OS, design paradigm of the OS, colour of the developer's underwear, or whether we use a penguin or a flying box to represent ourselves. Only trolls would be saying "Ha ha ha ! Serves 'em right for running Bill Gates' Satanic OS. Let the jokes begin. Moderators, get ready !" if Microsoft had a machine get hacked because of a password compromise.
Worse than Microsoft? (Score:4, Insightful)
Re:Would Microsoft announce that it was compromise (Score:4, Insightful)
Re:Grumble, grumble (Score:1, Insightful)
If everyone were patient all the time, it would be different, but it's very selective.
Re:Grumble, grumble (Score:2, Insightful)
If Microsoft's source code database had been rooted every day for the last 20 years, you wouldn't know about it. Worse, you wouldn't have any way to verify the binaries you're running now. There are hundreds of builds of Windows in the field at any one time, and those have been patched in a myriad of different ways, all where you can't see the results.
Debian has an enormous user base, and there'll be enough people worldwide to rebuild a source database, using all their sources to verify each one. That doesn't count whatever the Debian people have stored back away.
Re:I Haven't Paid for Debian (Score:2, Insightful)
Re:Worse than Microsoft? (Score:3, Insightful)
This belief that Linux is some kind of new kid on the block and untested completely ignores history. First, Linux deployments have existed in considerable strength for years now. It may not be on every desktop. It may be new to some corporate networks. But Linux has been embraced by ISPs and hosting services for far longer than Linux was even an IT industry buzz word.
The target that Linux presents also grows beyond Linux's own install base. Much of what can be attacked on a Linux server is not Linux-specific. Finding exploitable holes in common Unix subsystems can often mean the ability to attack a large base of servers - be they running Linux or common Unix systems (such as *BSD or Solaris).
In short, Linux has been exposed to scritiny for years.
There is certainly some good advice here. Linux's critics are right on one thing: Linux is not a silver bullet for security. Information security is a complex issue. Linux can be used to simplify this issue to a point. But popping in a Linux CD and clicking on the affirmitive button until everything installs is not the answer.
Linux advocates should be carefull that while they make their point, they don't oversimply to the extent of being misleading.
Re:A sign of things to come (Score:3, Insightful)
"If they can't stand the criticism, then they should just shut the hell up."
As opposed to the Windows community? Moderators from many Windows forums can and will ban you if you say anything that they don't agree with.
Besides, most "criticism" isn't criticism at all, but just insults, flames, trolls and whining. All those "criticism" don't provide any information to make the situation better: all they do is try to mentally hurt people.
Secrecy is the only embarassing thing. (Score:3, Insightful)
From my perspective, hiding it is embarassing for business. A major part of the reason I use Debian is exactly this announcement. I could have guaranteed as a fact that the Debian servers would be compromised, it was just a matter of time. What's important to me is that it's easy to detect when it happens, and that everyone is told about it as soon as it happens.
I have one of my machines which I updated during the compromised period. Now I know that when this investigation is complete, I need to check the details to see if the machine needs treatment.
That's how full disclosure is supposed to work.
Re:How in the world... (Score:2, Insightful)
Re:Grumble, grumble (Score:1, Insightful)
Oh but this is Slashdork so gnu.org getting rooted is just a little non-event as far as everyone is concerned.
Re:...not the archive. (Score:2, Insightful)
Christ, if people keep ignoring issues in open source software, the whole thing is gonna sink in a couple of years, and people will remember Linux as yet another stupid thing they invested money on, much like push technology.