Debian Project Servers Compromised 666
Sean was one of many to pass along
the bad news
from the debian-announce mailing list: "Some Debian Project machines have been compromised. This is a very unfortunate incident to report about. Some Debian servers were found to have been compromised in the last 24 hours. The archive is not affected by this compromise! In particular the following machines have been affected: 'master' (Bug Tracking System), 'murphy' (mailing lists), 'gluck' (web, cvs), 'klecker' (security, non-us, web search, www-master). Some of these services are currently not available as the machines undergo close inspection. Some services have been moved to other machines (www.debian.org for example). The security archive will be verified from trusted sources before it
will become available again." They were going to announce 3.0r2 this morning; they've checked it and it's unaffected but obviously they're still postponing that release.
Not on debian-announce archive (Score:3, Informative)
-JohnF
Re:Not on debian-announce archive (Score:5, Informative)
Re:Not on debian-announce archive (Score:2, Insightful)
Re:Not on debian-announce archive (Score:5, Informative)
I got the email too, and I checked its Received: headers against a debian-announce message in my mail archives from about a year ago. They both came from the same source. So there's no way this is a hoax ...unless the murphy.debian.org machine that emailed it to me is compromised, in which case it's not an inaccurate hoax :/
Re:Not on debian-announce archive (Score:2, Informative)
Re:Not on debian-announce archive (Score:3, Funny)
Except that anonymous coward person. I've never seen *him* in the keyring...
Where's the confirmation from debian people? (Score:3, Interesting)
There was some fuss on the debian-user list, and this was labeled a hoax, yet I saw no official word that it was true.
Re:Where's the confirmation from debian people? (Score:5, Informative)
Re:Where's the confirmation from debian people? (Score:5, Informative)
This is a truthful report.
You may validate this message against the key for skx@debian.org.
Steve
--
-----BEGIN PGP MESSAGE-----
Version: GnuPG v1.2.3 (GNU/Linux)
owGbwMvMwCR44PyxzWd9eOcyns5PYrDfJ7EiJCOzWAGIEhV
i0r0uLgi80sVchMrFcoSczJTEktSFUpAi
aflFCsXZFQ4pqUmZiXl6+UXpQCO4gktSy
SLxI+1madnvjbIZVrZu0HcTnzGdY0LBFy
=xVtr
-----END PGP MESSAGE-----
Re:Where's the confirmation from debian people? (Score:5, Interesting)
Thanks for confirming this. Unfortunately, the way you confirmed it is very dangerous.
Your message contains:
So from now one, your "confirmation" can be used by anybody who wants to claim that some random report of theirs is "confirmed by a debian developer". Until you revoke your own key, of course. That's a pity.
Re:Where's the confirmation from debian people? (Score:5, Informative)
SCO Again!... (Score:5, Funny)
dave
Tech stuff [homelinux.net]
Re:SCO Again!... (Score:5, Funny)
That explains (Score:3, Informative)
Re:That explains (Score:4, Funny)
You should be using... (Score:4, Funny)
Funny, my apt-get using h4x0r3d.debian.org was working perfectly....
apt (Score:4, Interesting)
Signatures? (Score:4, Interesting)
Re:Signatures? (Score:5, Informative)
Re:apt (Score:3, Informative)
Re:apt (Score:4, Interesting)
Re:apt (Score:3, Informative)
Indeed, that's one of the few areas where the Debian Project has lagged behind other distribution vendors technically - cryptographic signature verification for packages.
This infrastructure has been kind of long in coming, but as of a few months ago, you can now verify Debian package signatures with debsig-verify [debian.org]. Might I suggest everyone install and use that?
Re:SO MUCH FOR YOUR SECURE OPERATING SYSTEM (Score:4, Insightful)
Re:apt (Score:5, Insightful)
I do have to say that I am still happier with Debian broadcasting this incident as loudly as possible rather than the corporate tactic of hushing it up (I know of a few companys that have done just that). Thanks for the open honesty Debian!
Re:apt (Score:3, Informative)
Digital Signing of Packages? (Score:5, Interesting)
Re:Digital Signing of Packages? (Score:5, Informative)
MD5 sums are used for the contents of packages, but packages may only be uploaded and processed by the build system if they're correctly signed.
So yes it's not trivial to backdoor a package - unless you're already a Debian Developer...
Re:Digital Signing of Packages? (Score:3, Interesting)
Now what's that they say about chains and the weakest link?
Re:Digital Signing of Packages? (Score:3, Interesting)
Re:Digital Signing of Packages? (Score:3, Interesting)
Re:Digital Signing of Packages? (Score:5, Insightful)
The person operating the non-networked signing machine still needs to be sure that what-it-is-that-they-are-signing is what-it-is-supposed-to-be.
Now how does digitial signing on a non-connected machine help you know the source wasn't tampered with?
Re:Digital Signing of Packages? (Score:3, Insightful)
The point of the idea would be that breaking into the server wouldn't allow you to modify packages - you'd need a developer's private key to sign it too, or get the developer to sign a bad package.
When it's found security is compromised, all that is needed is to revoke the developer's key. If apt-get is changed so that it checks for revokations before installing the package, the damage will be much less.
The
Where did you get those keys? (Score:3, Interesting)
This probably would be no good as a way to sneak backdoors onto more than a few machines, since keys are usually stored once and used often. But it would be good to have some sort of key distribution and verification system. Imagine a key publisher having 7 peers, and where they carry same keys, requiring 5 to 7 matching signatures, and point a nasty
Nobody's asking you to trust the keyserver (Score:5, Informative)
PGP keyservers (unlike, say, Kerberos KDCs) are completely untrusted. Anyone can upload any key to a keyserver. And downloading a key from a keyserver implies nothing about that key.
To verify that you have a valid key, you have to rely on the web of trust. Basically, if a key is signed by someone whose key is signed by someone [recurse through however many levels you are comfortable with] whose key you have personally inspected, then the key can be assigned a trust metric based on how reliable you consider that chain of signatures to be. (Basically, how much you trust the integrity and acuity of the people controlling the chain of signatures.)
PGP and GnuPG have supported this infrastructure from Day 1. Asking people to trust an arbitrary third-party public keyserver was never in the plans.
How long will it take? (Score:4, Insightful)
Re:How long will it take? (Score:5, Insightful)
Password stealing is pretty OS independent.
So this compromise, whilst undenyably bad, isn't really going to show much about Debian, or Windows.
Re:How long will it take? (Score:2)
Re:How long will it take? (Score:2)
Would Microsoft announce that it was compromised? (Score:5, Insightful)
Transparency is a prerequisite for trust.
Re:Would Microsoft announce that it was compromise (Score:4, Insightful)
Re:How long will it take? (Score:2)
While I agree with your statement in general, I think the only reason most "midranges" and "mainframes" aren't compromised is that most of them are no where close to being connected directly to the internet. But, I bet with some bored creative internal employees, they're just as crackable, and just as (if not more) behind on patches and
Re:Honestly... (Score:5, Informative)
Not true. [computerworld.com]
Everyone here knows if windowsupdate.microsoft.com had been compromised, people would be droning on about how it's some sort of illustration of Microsoft's security.
Their update server wasn't compromised, but the debian archive also wasn't compromised in this case. But, yes, we have to work harder to make our servers secure. And we will never reach the point were our systems will be unvulnerable. So what is your point? You complain that there aren't enough anti-oss-trolls here?
Re:Honestly... (Score:3, Informative)
It has been before. when code red hit. [winnetmag.com] Although the link given in that article is no longer working there are plenty of screen shots of www.windowsupdate.com with 'hacked by chinese' on it out there somewhere.
You cannot blindly trust anything, from anyone. I don't care if Mom says her apple pie is just dandy I'm gonna run my own tests.
Re:Honestly... (Score:3, Informative)
I'd hate to say this too, since it is wrong.
Microsoft's internal network was compromised, as reported by the BBC [bbc.co.uk], and many other news agencies.
So, please do some research before welcoming your "secure" overlords...
Re:How long will it take? (Score:3, Insightful)
How long for 3.0r2? (Score:2)
Has a Microsoft release ever been compromised? (Score:2, Funny)
Let's just remember that before we extoll the virtues of how great open source is.
Re:Has a Microsoft release ever been compromised? (Score:4, Informative)
I don't know if this delayed a release, but -- in October 2000, the news broke that Microsoft's internal network had been cracked for three months.
(Debian made this announcement in 24 hours.)
Read for yourself:
Microsoft Cracked [slashdot.org]
OS? (Score:2)
Hearing the news, (Score:5, Funny)
Re:Hearing the news, (Score:3, Funny)
Bonus point for Debian (Score:2, Insightful)
Here we can see the strength of such projects, as in this [slashdot.org] recent kernel story.
Makes you wonder (Score:5, Insightful)
As someone who works with networking security, I know lots of business servers get compromised regularly. Everyone hides it because it's embarassing for a business.
This makes you wonder how often other 'critical systems' get compromised, and get fixed without any public reports. Government computer systems get regularly compromised after all. But I'm sure so do vital Microsoft, IBM, systems, etc. Windows Update, anyone?
Secrecy is the only embarassing thing. (Score:3, Insightful)
From my perspective, hiding it is embarassing for business. A major part of the reason I use Debian is exactly this announcement. I could have guaranteed as a fact that the Debian servers would be compromised, it was just a matter of time. What's important to me is that it's easy to detect when it happens, and that everyone is told about it as soon as it happens.
I have one of my machines which I updated during the compromised period. Now I kno
Signed announcement (Score:2, Informative)
To verify it:
$ wget -O- http://cert.uni-stuttgart.de/files/fw/debian-secu
(drop the space, of course)
Assuming you trust the key it was signed with, of course...
Sign, sign, sign, sign. (Score:5, Insightful)
Re:Sign, sign, sign, sign. (Score:4, Informative)
Which is exactly the state in Debian, too.
Jeremy
Re:Sign, sign, sign, sign. (Score:3, Informative)
Before a Debian Developer enters the project the key they will use for signing has to be signed by another Debian Developer. You'll note that many Debian Developers are strongly connected [kjsl.com] on the various keysigning lists, so it is pretty hard for the key to be faked and verified by multiple people.
Finally, the NM process [debian.org] itself is the ultimate arbitrator of who enters Debian. A prospective developer
Everything's a tradeoff (Score:5, Interesting)
At this point I would like to see the debian team develop some written policies and procedures for how they intend to prevent this sort of thing in the future. I checked the site and while there's security info for how to secure your box, there's no policies on 'how does the debian project secure itself'.
Lastly, one concept you have to keep in mind, we have no idea how often other OS's key servers are cracked because they'd never tell us.
A sign of things to come (Score:3, Insightful)
Open-source projects are not immune to attack and they are going to start feeling some of the pain experienced by other big targets like Microsoft. In the beginning it could be really bad because unless you're being attacked seriously all the time then you may not even realize where your vulnerabilities are.
This is a wake-up call to all "open" projects. Systems that are in use by a large number of people need to be protected better. Sure, this may have been a password compromise but the system should have been secure enough that some low-level user account compromise can't cause serious damage. And the high level accounts should never, ever have a password compromise. This needs to be treated in the same way big business does. Protect the customers, otherwise you may lose them.
This made me start thinking... Has Redhat ever been compromised? That'd be a reason for going with a commercial distro if the free distros can't get their act together. (I've been a Debian user for many years by the way)
Re:A sign of things to come (Score:5, Insightful)
People *already* know that OSS is not perfect, and they have known for years. People already know OSS is not immune.
But, more importantly, those same people know *nothing* is immune. Not MS, not Linux, not BSD, not (even!) MacOS, not DOS. *All* systems can be hacked.
What *really* matters is the attitude to security.
- A lot of the larger OSS projects care deeply about security. If a security bug is found, it's usually fixed very fast, and the fix will be peer reviewed.
- They openly admit all flaws and bugs. Because of this, OSS *appears* to have more bugs.
Do you see Microsoft admit all their bugs? I don't think so. MS hides a lot of bugs, pretending that they don't exist and that Windows is perfect.
Too bad all the MS zealots and anti-OSS/anti-Linux zealots use that to "proof" Windows is more secure than Linux/OSS/whatever. The number of bugs is *not* an accurate indication of security.
Linux zealots are only a small minority of the community. If you think they represent the entire community then you're wrong, just like so many people out there.
"Has Redhat ever been compromised?"
Maybe. If they haven't then it's because of pure luck.
Re:A sign of things to come (Score:3)
This place is nothing but a haven for anti-Microsoft bias. It's not pro-Linux.
Linux zealots are only a small minority of the community.
Yet they are the most vocal.
If you think they represent the entire community then you're wrong, just like so many people out there.
Let's face it, Linux and its community of developers will never be accepted professionally beause of their unpr
Re:A sign of things to come (Score:3, Insightful)
"If they can't stand the criticism, then they should just shut the hell up."
As opposed to the Windows community? Moderators from many Windows forums can and will ban you if you say anything that they don't agree with.
Besides, most "criticism" isn't criticism at all, but just insults, flames, trolls and wh
Next time run a mac... (Score:2)
OH NO!!!! (Score:5, Funny)
Comment removed (Score:3, Interesting)
Re:So what do we do to prevent this in the future? (Score:3, Interesting)
No... the way to alter software is easy to conceive.
You simply have to hack into the computer holding the private keys used for the signing (very likely the same computer holding the source code as well, and the system which normally uploads new packages to the distribution point). Once there, you can make changes and sign them just as if they were official.
Re: (Score:3, Interesting)
Terrorist attack against Debian (Score:4, Funny)
What the hell? (Score:4, Funny)
Tempered Arrogance (Score:5, Insightful)
All three of my Linux boxes run Debian; this latest security breach will not change that.
However, I hope this type of incident tempers the often-strident elitism of the free software camp. My faith in Debian continues because they caught this problem and openly announced it; my concern is that the lack of consequences will make people assume that this was a false alarm or unimportant incident.
Free software suffers from "victory disease" -- an assumption that, based on past success, future success is guaranteed. Because free software has proven reliable and secure, the concensus seems to be that it will always be so.
Pride comes before the fall, as they say. Attempted infiltrations of the Linux source code control system and breaches of security at Debian suggest that we need to be cautiously optimistic, not naively myopic.
Common sense snippets (Score:5, Insightful)
218 posts and some rare appropriate reactions.
Regards,
JDif
I Haven't Paid for Debian (Score:5, Interesting)
One server compromise in the two years that I've been watching by a company with zero product sales revenue is pretty impressive. An OS that is (IMO) dramatically superior to any commercial offering for free? They've earned my respect, and have clearly earned my cash.
Worse than Microsoft? (Score:4, Insightful)
Re:Worse than Microsoft? (Score:3, Insightful)
This belief that Linux is some kind of new kid on the block and untested complet
GPG already! (Score:3, Interesting)
It's about time will all the server compromised these days...
that really sucks... (Score:3, Funny)
But security holes exist, there is no getting around this, no matter how paranoid you are...
trust me..
I am a sitting in a faraday cage right now...I built it in my apartment to keep those pesky NSA spooks from uplinking with the nano-chips they implanted in my brain....
most of us are now implanted...you can't dig them out...i've tried....
SE Linux (Score:4, Interesting)
Machine as important as these should be running some sort of Mandatory Access Control system like SE Linux [nsa.gov]. I have done an evaluation of all of the root exploits I could find over the last few years and SE Linux would have prevented every one of them because the MAC system prevents unauthorized priviledge escalations. You can test drive my SE Linux box by telnetting (not ssh) to selinux.copilotconsulting.com with user root and password root.
Am I the only one? (Score:3, Interesting)
I mean, we can't find the unintentional ones. What makes you think we could find one chosen for its obscurity?
Re:...not the archive. (Score:2, Insightful)
Grumble, grumble (Score:5, Insightful)
password (Score:4, Insightful)
Then, have your password stolen, and oh shit, you're compromised. It's not about the OS being insecure, it's about a lost password. NOTHING can protect against this, short of one instance I heard where updates required 3 user passwords (from 3 users), but what a pain that would be.
Re:...not the archive. (Score:5, Informative)
As far as I understand, no machines apart from the several Debian computers have been compromised. Compromising a machine that hosts the central Debian APT repositories is a perfect opportunity for backdooring thousands of machines In this case, that didn't happen. "Thousands of machines across the globe" have not been compromised. I guess it's only good luck but Debian users were not affected by this security breach.
Re:...not the archive. (Score:5, Interesting)
Re:Running Debian-Stable? (Score:3, Informative)
- accounts can be compromised
- unknown bugs may have been exploited (although that's unlikely in this particular case)
- crackers could have been cracking a developer's system, and using information they find on that developer's hard disk (ssh key, gpg key,
- also of importance in general is the competence of the administrators (which surely is *not* at the cause of the problem here).
Of course these sy
Re:How in the world... (Score:5, Informative)
Yes Debian's machines run Debian, this breakin wasn't anything to do with the software installed upon the box, as it was due to a password compromise.
If anything it's more embaressing that somebody lost their password than that the software wasn't up to date.
Re:How in the world... (Score:3, Interesting)
Of course, we shouldn't jump to conclusions until we get more information, but really, I don't see an easy way out of this.
Re:How in the world... (Score:4, Insightful)
Why should you? They were cracked. The bad thing has already happen, so there is no easy way out. However, there *is* a *right* way out. And that includes telling people what they know as quickly and effectively as they can. Too much information too early can be a bad thing.
In short: have a little faith that they're dealing with this correctly, unless you've run a massively-used public box for years without a single compromise.
-Rob
Re:How in the world... (Score:5, Insightful)
They will when it's known. They felt it more important to announce what's going on immediately than to wait until there were details to announce. Part of Debian's social contract is "we will not hide problems"; this announcement and those that will follow as more is known demonstrate this policy in action.
Comment removed (Score:4, Insightful)
Re:What was that about Windows servers? (Score:3, Interesting)
Unfortunately, I believe that that's already the case, and has been for as long as I've been a Debian developer. I believe what really happened is that somebody's home account or something was compromised, and they did the stupid passwordless ssh key thing (instructions for which are even on the Debian devel web site!). Even if they didn't use passwordless
Re:OpenBSD (Score:5, Insightful)
I also think that Gentoo would have prevented this tragedy.
Not really. The vast majority of break-ins are through misconfiguration or human error. Gentoo, OpenBSD, nor anything else, can prevent these factors. I would be very surprised if this was due to a security hole or vulnerability. More likely someone wasn't secure enough with their SSH keys or something like that.
Re:OpenBSD (Score:2, Interesting)
OpenBSD prevents stolen passwords from being used to log into a system? How?
Re:OpenBSD (Score:5, Insightful)
It's not about Linux vs Microsoft, it's about Open Source vs Microsoft.
Heck, maybe even Unix vs Microsoft. Because then we can use MacOS X to beat all the Windows zealots.
Re:whoa - better switch to NT ! (Score:3, Funny)
This should read "Bi11 g4T3z". Please respect the proper "3l33t" spelling. Thank you.
Another public-service message from your friendly spelling nazi. Or N4zi.
Re:Double Standard on /. (Score:5, Insightful)
Windows Box Compromised: Someone exploited a flaw.
Linux Box Compromised: Insecure password.
or, if it IS due to a flaw exploit...
Linux: Box compromised because machine wasn't carrying latest patches.
Windows: Box compromised even though machine was updated last week.
Linux: Exploit found. Exploit gets fixed. Publically. Usually the same month - with a temp-patch available within the week.
Windows: Exploit found. Exploit gets fixed. Eventually. As a part of the next service pack. Newsgroups, Slashdot and third-party sites suggest workaround. MSKB just says "Problem is under investigation"
Oh, and there's always...:
Windows exploited:
Linux exploited:
(Or sending "Use a good password" memos around the office, stating that if an organisation like Debian can be compromised by a password, then Joe Average in accounts hasn't got a hope in hell if his password it the cat's name.)
What's with all the trolls lately? (Score:5, Insightful)
In case you haven't noticed, Slashdot has, and always has had, an editorial bias towards OSS, and against Microsoft. So do the bulk of the Slashdot readership. This is nothing new. This is a geek website, and the plain truth is, most people who call themselves geeks don't just sit blindy clicking away in Windows all the time. We like to play with our toys, we like experiment, we like to open it up and see what makes this baby tick. With something like Linux, you can do this. With Windows, you can't. Those are simply the facts. So of course people here will look upon OSS in a more favorable light.
Yet today, we have comments such as "hysterical ranting of the Debian wackos" being modded up as Insightful and Interesting? Hello people, that's called flaming. If it was more subtle, as yours is, it's called trolling. Walking into a Britney Spears fan club meeting and shouting "Britney SUCKS!!!" is also an example of trolling/flaming. So when you come to a website with an obvious and open slant towards something, and constantly try to point out that slant...
Well, I guess I just don't see why you're bothering. I mean really. If you really think the OSS community is full of shit, why on Earth do you come to one of their main websites/blogs/message boards/whatever?
As far as a double standard goes, I honestly don't get your point. Slashdot has never had a policy of reporting every single hack of a Windows-based system. However, pretty much every major OSS hole/exploit/hack gets a story here. Considering how many Windows machines there are in the world, you'd think there would be a lot MORE exploiting going on (hey, I'll use the "Linux would get hacked too if it was on 90% of computers" line for a change). And yet, we hear more often about Linux machines being compromised.
Well, except for things like Code Red/Nimda/Slammer/Blaster/etc, which, I'm sorry, but you'd have a hard time convincing me that this DOESN'T prove the case of Microsoft being just slightly less secure than Linux. Or else we'd be seeing Apache worms flooding the Internet on a daily basis, because "Microsoft only gets hacked because it's on 90% of computers", right?
Oh, and for the record, password compromises are OS-independant, and have nothing (read: zero) to do with the OS, design paradigm of the OS, colour of the developer's underwear, or whether we use a penguin or a flying box to represent ourselves. Only trolls would be saying "Ha ha ha ! Serves 'em right for running Bill Gates' Satanic OS. Let the jokes begin. Moderators, get ready !" if Microsoft had a machine get hacked because of a password compromise.
Re:Double Standard on /. (Score:3, Insightful)
No,
Re:Why Gentoo is Better (Score:3, Insightful)
That and why you don't bleep want to get bleeping flamed and yet you bleep bleeep bleep bleepbleep didn't bother reading the article before posting.
Re:Debian - maybe not so great (Score:4, Insightful)
What does this have to do with the "quality" of Debian? AFAIK, the vulnerability that lead to the compromising hasn't been revealed yet. I could have been something as simple as a guessed password.