


Red Hat, Fedora Servers Compromised 278
An anonymous reader writes "In an email sent to the fedora-announce mailing list, it has been revealed that both Fedora and Red Hat servers have been compromised. As a result Fedora is changing their package signing key. Red Hat has released a security advisory and a script to detect potentially compromised openssh packages."
Nothing to see here. (Score:5, Insightful)
These are the guys, to the annoyance of nearly everyone, who turned on SELinux on Fedora Core by default.
These are the guys who noticed they annoyed everyone, and turned on targeted-mode by default.
Coming from someone with many systems, completely exposed to the Internet, with thousand day uptimes, these RedHat folk are in fact sufficiently paranoid.
They have taken all the reasonable precautions, and if their passphrase was strong, then the danger of my servers being compromised by meteor strike is a much greater worry.
Re:Nothing to see here. (Score:5, Informative)
The only thing that concerns me is this: In the Fedora announcement, they said with a high level of confidence, they don't believe the passphrase for their signing key was compromised, because they hadn't signed any packages during the period of time the box was compromised. They are going to change the signing key anyway just in case. This is a good thing.
In the Redhat announcement, we can infer the passphrase and signing key were compromised, because the attacker signed invalid openssh packages. Even though the official RHN distribution channel was not compromised, the attacker most likely still has their private key and passphrase and can continue signing packages and attempting to distribute them. Redhat needs to step up and reissue a new signing key. There was no announcement of this.
Re: (Score:2, Interesting)
Or we could infer that the system was used for its purpose by the attacker. He signed those packages. Redhat looked at the logs, no other packages were signed. So the passphrase is still very likely to be save.
Re:Nothing to see here. (Score:4, Interesting)
God, I seriously hope they don't have the passphrase saved so that you don't need to type it in to sign a package. If that is the case their security is very lax. Also, if it's saved, it almost certainly is compromised, because it's stored on disk somewhere. It would be trivial for the attacker to pull it out of whatever script or text file it's saved in.
Re:Nothing to see here. (Score:4, Interesting)
God, I seriously hope they don't have the passphrase saved so that you don't need to type it in to sign a package. If that is the case their security is very lax.
I don't know about anyone else, but I am surprised that their package signing machine is connected via a network to other machines.
Our code signing machine is locked in a cage and powered up only for purposes of code signing. Executables to be signed are written to a previously wiped USB drive which is attached to the signing machine only when packages are to be signed. The signing machine has not been connected to a network since before the keys were generated. The private key only exists on that machine and in a single separately encrypted backup.
I've always considered that to be a minimally paranoid means of keeping private keys private. Really paranoid would be "signed on one machine, checked and signed again on another machine."
Re:Nothing to see here. (Score:4, Funny)
Our code signing machine is locked in a cage and powered up only for purposes of code signing. Executables to be signed are written to a previously wiped USB drive which is attached to the signing machine only when packages are to be signed. The signing machine has not been connected to a network since before the keys were generated. The private key only exists on that machine and in a single separately encrypted backup.
Meh!
Well my code signing machine is more secure. We don't put USB sticks directly into the signing machine. We copy the package to a USB stick and then to the 'transfer' machine. The code signing machine is then 'connected' to the transfer machine by infared link which is unblocked by lifting a large steel slab out of the way. The transfer happens via zmodem, and it scanned on both the transfer machine and the code signing machine. Finally we sign the package and transfer it back just before the poor intern's strength gives out and the steel slab slams back down, killing the connection and the intern...(just in case he saw me type in the 42-character passphrase to the private key).
Beat that security...
Re: (Score:3, Funny)
Re:Nothing to see here. (Score:5, Insightful)
Red Hat needs to offer more info before you can make a solid judgement about this.
If the attacker gained access to the actual system where signing takes place then Red Hat needs to change the key.
But from the announcement wording - they are suggesting that the attacker was able to submit packages to be signed but the actual signing server was not compromised.
They should not have been so vague about this because it is a crucial distinction to make for their customer to make a security judgement.
As a customer I'm not happy with the vague details on what was compromised. I'm sure they did it because they have concerns about describing their package signing systems in detail but they need to open the kimono and give us the detail we need to make a decision about reloading our systems.
Merely saying, "trust us - anything that came from the official channel is safe" doesn't fly. You let an attacker gain unauthorized access - you need to re-earn trust at this point by giving us some detailed info.
Re:Nothing to see here. (Score:5, Interesting)
Re:Nothing to see here. (Score:5, Insightful)
Re:Nothing to see here. (Score:4, Insightful)
Re: (Score:3, Insightful)
Yes, that is what surprised me, too. However, I'd think they would know what they are doing, and are acting in good faith, because they could have tried to keep the whole incident secret instead.
I don't see why an attacker would sign the packages one that server, instead of just taking the key and signing them elsewhere. Because of this, Red Hat now has the signatures of the tampered OpenSSH packages. If the attacker had signed them elsewhere, they wouldn't, making the packages more valuable.
Is there a tec
Re: (Score:2)
Good point. If the attacker still has the private key and passphrase, he can trivially repackage any older RPMs and sign them again.
Re:Nothing to see here. (Score:5, Informative)
Our RedHat TAM tells us that "the signing infrastructure is completely different between fedora and RHEL" and that RHEL uses "a submit to be signed" method. So essentially, someone submitted packages and the system automatically signed them.
Re:Nothing to see here. (Score:5, Informative)
In the Redhat announcement, we can infer the passphrase and signing key were compromised, because the attacker signed invalid openssh packages.
Incorrect. The signing key used by Red Hat is inside a hardware security token.
So even though it was possible to use the token to sign packages as soon as access to the token has been removed for the intruder, he is unable to sign any more packages.
Mark Cox of the Red Hat security team explained this setup in a blog post some time ago at http://www.awe.com/mark/blog/200701300906.html [awe.com].
Re: (Score:3, Informative)
Re: (Score:2, Insightful)
Coming from someone with many systems, completely exposed to the Internet, with thousand day uptimes, these RedHat folk are in fact sufficiently paranoid.
Ummm, I'm quite curious, how do you keep your system up for 3 years? Do you not update your kernel? Or is there some way to update a running kernel without rebooting that I don't know about...
Re: (Score:3, Funny)
Yea I guess they don't care that a kernel compromise completely negates any security benefit from SELinux.
Re: (Score:3, Informative)
Re: (Score:2)
The targeted POLICY is the weaker of the two most common policy. The other is strict which is a bit too harsh for most.
SELinux also has modes. The only one worth using in production is enforcing which actually enforces the rules. There's also permissive which logs when rules are violated but lets them happen anyway; this is good for development but obviously won't save you from a real attack.
Do they run linux? (Score:5, Funny)
Re:Do they run linux? (Score:5, Funny)
Re:Do they run linux? (Score:4, Funny)
***Whoosh***
Re: (Score:2, Informative)
Watch out! That joke's coming straight for your cranium! ...Whew, it missed and flew completely over your head.
Re:Do they run linux? (Score:4, Funny)
Goes to show (Score:5, Insightful)
Given enough time and energy, even Linux servers can be hacked.
With the growing interest in Linux, I wonder if we'll see more parity of viruses between Windows and Linux.
Re:Goes to show (Score:4, Insightful)
Re: (Score:3, Insightful)
If a custom box running JoeOS contains something extremely financially valuable, you can bet people will start trying to hack it.
Security through Obscurity is not only wrong, but terrifying that people buy into the concept.
Re: (Score:3, Insightful)
I think the parent is talking more about general viruses that are just sent out into the tubes with the intent of auto-rooting insecure boxen.
What you're saying is true "Any system with something desirable on it is at risk of getting wHacked", but one system with important information on it is not going to spawn a breed of viri meant to just root ALL of the boxes with that OS.
Re: (Score:2)
However, since infecting a server is lower profile than infecting 1000 home computers, people looking for notoriety won't be doing it. I imagine that if someone fin
Re: (Score:2)
The Atari ST had plenty of viruses without 50% of the end-user marketshare.
The notion that "obscurity" protects Linux is beyond preposterous.
Re:Goes to show (Score:4, Insightful)
Re:Goes to show (Score:5, Insightful)
The virus can install itself in the user home directory instead.
And then use one of the many local exploits to get root.
The most scary and amusing thing is how quick some people on this site and others are to dismiss local exploits. They all think "you have to be on the console, so fuck it, this isn't important and doesn't affect me". They are wrong. These days, a remote exploit is just a human operator and a local exploit.
Re: (Score:2)
Thankfully we have the noexec mounting option available.
Re:Goes to show (Score:4, Informative)
Thankfully we have the noexec mounting option available.
That's no good. Scripts can be run by invoking the interpreter first, like so:
/usr/bin/perl /home/user/proggie
and binaries by starting them like so:
/lib/ld-linux.so.2 /home/user/proggie
Re: (Score:3, Informative)
I believe /lib/ld-linux.so.2 actually checks that the partition isn't mounted noexec. That doesn't make relying on noexec safe, of course.
However, selinux can do it securely (even if it could be a pain to define the policy).
Re:Goes to show (Score:4, Informative)
There's absolutely nothing to stop anybody from installing an executable that runs automatically under a user account, without ever needing root. And that executable can do a lot of the things it may want to do without ever needing root access, either.
Re: (Score:2, Troll)
Like change system files? Nope. How about bind to privileged ports? Nope. So... it can mess up my documents? Darn.
Re:Goes to show (Score:5, Insightful)
The point is, there's no need to change system files or bind to privileged ports.
Your documents contains LOTS of yummy personal information for people to steal. Identity thieves and credit card thieves will love all that stuff.
Spammers need relays to send their spam through. You can run a relay just fine as a normal user. Same thing with the DDoS bot for exortotionists and script kiddies.
You can mess with the internals of Firefox without root access too, through plugins. Easy to put a password stealer in there. Or you could mess with your desktop settings so that when you try to launch a browser, you get a compromised version instead.
I'd say I've covered all the major reasons somebody would want to infect your machine here, and not a single system file or privileged port was needed for it.
Re: (Score:3, Interesting)
"Spammers need relays to send their spam through. You can run a relay just fine as a normal user"
Not if you don't have access to the firewall settings which will open the port that allows someone to connect to your relay.
"You can mess with the internals of Firefox without root access too, through plugins. Easy to put a password stealer in there."
Yes, but without access to the system FF folder, that plugin will go in your per-user plugin directory, and will only run for you. So only your passwords will be st
Re:Goes to show (Score:4, Insightful)
Not if you don't have access to the firewall settings which will open the port that allows someone to connect to your relay.
Unless you happen to run one of the desktop distros which usually have a default policy of ACCEPT.
Of course, the "only works for one user" argument is better if presented in reverse. If your less-computer-literate kid/spouse/parent can't accidentally run code that (...)
Read all my documents through the world-readable home folders? Another convienience feature.
My experience is that people don't keep the accounts truly separate, that's just for convienience. "Hey, can I just check my webmail for a sec?" "Sure" and your email's compromised.
Furthermore, you'll be in a position to be able to clean their account up for them without having to wipe and reinstall the whole machine
in theory. In practise, I expect the malware authors to find so many ways of hiding (or just when you "rescue" his documents) that it won't practicly happen. Least not without someone more experienced than the average guy.
Re:Goes to show (Score:5, Insightful)
Not if you don't have access to the firewall settings which will open the port that allows someone to connect to your relay.
The program can just make the initial connection to the spammer server itself. This is the same on Windows and Linux, and these programs operate just fine under Windows.
Yes, but without access to the system FF folder, that plugin will go in your per-user plugin directory, and will only run for you.
How many computers do you honestly think there are out there that have more than a single user?
Re:Goes to show (Score:4, Interesting)
Not if you don't have access to the firewall settings which will open the port that allows someone to connect to your relay.
They don't need your relay. If they're running on your machine, they can fetch their payload and then start sending it out through your local MTA or configured SMTP server. If you can send e-mail, so can they.
Yes, but without access to the system FF folder, that plugin will go in your per-user plugin directory, and will only run for you. So only your passwords will be stolen, and not those of anyone else on the computer.
Given that most computers running Firefox these days are single-user systems, whether running Linux, OS X, or Windows 98.
Then consider Linux systems. Most systems these days are set up with sudo access, as is OS X. All the bug has to do is watch to see when you run sudo yourself, and then bam, it has a (usually) five-minute window to run itself as root and infect the rest of your system.
It can also grab your ~/.ssh/known_hosts and then reach out to those to see which ones accept your private key; install itself there, and, again, watch for sudo access. It's not hard for someone to go from there out to infecting every machine you have access to, and root on every machine you have root on, and potentially every system that every user on that system has access to, and so on, and so on.
Re: (Score:2)
Your documents contains LOTS of yummy personal information for people to steal
No they don't. I'm paranoid and don't keep that kind of documents on the computer.
Re: (Score:2)
Re: (Score:2)
The point is, they want root access or effective root access to install root kits so their network sockets and processes are hidden from the user.
With user account their virus is visible. Their network traffic is visible.
Re:Goes to show (Score:4, Insightful)
Like change system files? Nope. How about bind to privileged ports? Nope.
It can send spam, participate in DDoS attacks, act as a repository for kiddy porn, or just wait to take advantage of the next 0-day local privilege exploit.
In short, lack of root-level access is a minor annoyance to malware, not a critical problem.
So... it can mess up my documents? Darn.
Yes. It can mess what are most likely the most important and least-replaceable data on your machine. This doesn't bother you ?
Documens vs system files (Score:4, Insightful)
Like change system files? Nope. ... So... it can mess up my documents? Darn.
Oh, good. My life's work is reconstructable in a mere few decades; wheras if it damages system files, a reinstall could take up to half an hour!
Re: (Score:2)
You don't make backups?
Why do you have the computer? (Score:2)
Like change system files? Nope. How about bind to privileged ports? Nope. So... it can mess up my documents? Darn.
Why do you have the computer? Just so you can have some privileged ports and system files that a remote exploit to an unprivileged account can't touch? Or do you actually, you know, use your computer for stuff?
Because if you're using your computer for anything, then that's what's really valuable.
Case in point: The private keys used to sign Red Hat/Fedora packages qualify as "documents" in your scenario.
Re:Goes to show (Score:5, Interesting)
There are plenty things that can be done.
Mounting /home with noexec
Using the grsecurity patch, which can deny execution of files not in directories owned by root, as well as usage of network sockets.
Using SELinux
The tools are there. All that's needed is to use them.
The need to download random binaries to your home directory and run them is infrequent in Linux. The most frequent case is application installers, but many of those need root access anyway (nvidia drivers for instance), and most come with the distribution. A way to fix the occasional need to do this would be a sudo-like tool that needs to be used to execute a file, but doesn't grant root privileges.
"most come with the distribution" (Score:2)
The need to download random binaries to your home directory and run them is infrequent in Linux. The most frequent case is application installers, but many of those need root access anyway (nvidia drivers for instance), and most come with the distribution.
Quite a few people who have posted comments to other Slashdot articles have claimed that the difficulty of installing software that did not "come with the distribution" holds back the spread of GNU/Linux on the home and small-office desktop. There are plenty of apps that just aren't suitable for the major distributions' repositories. For example, some apps are not notable because they're for a vertical market [wikipedia.org]. Others have good reason not to be free software with free content, such as many video games.
A way to fix the occasional need to do this would be a sudo-like tool that needs to be used to execute a file, but doesn't grant root privileges.
How sm
Re:Goes to show (Score:5, Informative)
If you're going to mount /home noexec, you should also mount /tmp as noexec as well. In fact, I'd wager you should do that well before you bother with /home. A lot of wormy/trojany stuff wants to write, unpack, build and execute in /tmp. In fact, while you're at it, make sure only root can run make and gcc, or get at any of the libs. All command line network tools (wget, ftp, etc) should also only be run by root. Now go through and get rid of most (all?) of the setuid root stuff. Then crank down the firewall to only allow incoming 22 and 80 (or whatever). That will take care of a wide range of automated stuff.
-B
Re: (Score:3, Insightful)
So cleanup is easier. But the damage may already be done, as criminals may now have your passwords, your credit card numbers, and your personal information. Plus you were probably sending spam up until the moment you noticed the infection.
Re: (Score:2)
PS: It's pretty disingenuous to make a point of that the Windows virus doesn't let you "search for help online", when your Linux scenario was all about asking help from a friend in the first place.
The Windows cleanup is a merely a little longer, as it requires an OS re-install and backup restore (also, that is what most people would do on Linux anyway). The vast majority of systems out there are single-user, you know.
Re: (Score:2)
"Me: do you have backups of your documents and important files?
User: yes"
Ahahahaha! Hahahahahaha! Hahahahahahahahahahah!
*rolls in aisles*
*holds sides*
*wipes tears of laughter from eyes*
Re: (Score:2, Insightful)
An icon to show you're handicapped by a keylogger (Score:2)
A keylogger wouldn't need root access. All it has to do is monitor the keyboard and send out packets.
In an ideal operating environment, any process that monitors the keyboard would show up in a list of accessibility tools, and the user could view this list using the "access" icon (shaped like a stylized man in a wheelchair [wikipedia.org]) in the system notification area.
Re: (Score:2)
Synergy, a keyboard sharing app, must run as the user. I use this to use one keyboard between an Windows laptop and Linux desktop at work. As the keyboard is only hooked up to my Linux box, and synergy runs as me I must assume that user level access is all that is needed for a keylogger.
Re: (Score:3, Insightful)
It also goes to show that the human side is usually where compromises come in to play. Most likely some admin had a weak password that was hacked, and that admin had permission to signing packages or things he should not have had.
I don't care how secure your OS is. If you don't follow proper security procedures, including using strong pas
Re: (Score:3, Insightful)
Thats correct. And as much as there are many issues with Windows security that -could- be exploited, usually, even there, the human side is easier to exploit... So those "skills" are portable... Will be interesting to see how the ecosystem reacts when it starts happening more and more... technological fixes won't do...
Re: (Score:2)
Re: (Score:2, Insightful)
Given enough time and energy, practically any network-connected system can be hacked. That is because security is *hard*, and there are few people who have the means to create chains that contain only strong links, and put those strong chains in the hands of a big audience.
But given workable tools, I think security comes down more to procedures, and a competent sysadmin than anything else. I'd put more faith in a well-managed Windows server than a Linux server with an idiot as admin. With all factors equal,
Re: (Score:2)
No, Windows' popularity is only a small part of the reason it is the only OS with viruses in the wild. The biggest reason is that it uses the discredited "security through obscurity", but it, too isn't the only reason Windows is insecure.
Mac and Linux are based on UNIX, which was developed for mainframes; mainframes have always needed security. Windows was developed before the wide popularity of the internet for stand alone computers. Stuff like Active-X is fine on a computer until you network it.
There are
Re: (Score:3, Informative)
Mac and Linux are based on UNIX, which was developed for mainframes.
No, Unix was developed for the PDP-7 and PDP-11. Those were minicomputers, not mainframes.
Re: (Score:2)
With the growing interest in Linux, I wonder if we'll see more parity of viruses between Windows and Linux.
This should sound familiar to most readers here. We've heard it before:
http://www.simson.net/clips/2000/2000.SecurityFocus.Linux_Viruses.html [simson.net]
http://web.archive.org/web/20000304004534/http://www.zdnet.co.uk/news/2000/3/ns-12862.html [archive.org]
http://www.vnunet.com/vnunet/news/2120227/honeymoon-linux-users [vnunet.com]
And the same general theme has even been fitted for the MacOS crowd:
http://www.linuxinsider.com/story/mac%C2%AD-security/57811.html [linuxinsider.com]
It's not that the concept is all that unlikely. Oddly enough, WinNT set a historical
Re: (Score:2)
What do you mean, "even Linux server"? How about "even every single computer in the world"?
Whoemever told you that Linux, Windows, OS X, OpenBSD or whatever is 100% invulnerable to authorized accesses is either ignorant or lying. Nothing is perfect, and there is no reason why Linux advocates should deny that fact. Saying "haha, look, Linux IS insecure after all!!!!1111" is not any more useful than "haha, look, you're a human being and you made a mistake after all!".
As for viruses, this compromise has got no
Re: (Score:2)
You'll sooner see phone viruses, methinks.
The advantage (for the virus distributers) is that Windows and OSX and iPhones have is that they share a common denominator of services and applications. It is much easier to target a system if you know what services are available.
For the most part Linux systems are custom builds with a variety of applications and services (and versions of) enabled. Someone could target a specific distribution or sets of distributions, and this has happened several times (slap
Re: (Score:2)
Everything I've learned about operating system design implies that Windows might be secured, but has a design that makes it much, much, much harder to achieve.
Please elaborate.
Re: (Score:2)
Windows?
A shell and applications that like to blur the boundary between
programs and data, automatically execute programs from unknown
sources and automatically install programs from unknown sources.
Microsoft goes out of it's way to be stupid.
Re: (Score:2)
If you want a Unix box broken into you have to "concentrate on it" and "work at it".
This is the part that's not required for Windows.
Dumb engineering practices aggravated by an anti-intellectual user culture of willful ignorance.
OpenSSH bug? (Score:4, Interesting)
Re: (Score:3, Funny)
In keeping with the spirit of /., I didn't read TFA.
However, I'd say this is totally unrelated to the Debian bug. The Debian bug was caused as a result of a change a Debian package maintainer made. Since he only made the change for the Debian package and didn't push it back upstream, it's highly unlikely that they are related.
Re: (Score:2, Informative)
Red Hat's OpenSSH bug involves X11 forwarding. As I recall, Debian's OpenSSH bug was a "fix" that dramatically reduced the entropy available for randomizing. I don't believe the two are related.
Re: (Score:2)
I read TFA and it seems that this is not a bug. It is rather a compromise as a result of illicit access to the servers.
Exactly HOW or WHO did this is not mentioned in TFA.
Re: (Score:2, Informative)
I'm from RH...
No, they are not related. Offical OpenSSH from Fedora or RH repositories do not contain bug (but the low priority X11 forwarding).
As a precautionary measure, we are releasing an updated version of these SSH packages, if you happend to install previous package from untrusted source (i.e. not RHN).
damn't (Score:2, Funny)
source code filching! nothing else.
when? (Score:2, Interesting)
Last week? Does that mean earlier this week, or the week before the week I'm in? At what point in whatever week was last week? If I did an install/update after a certain date am I covered?
It would be nice if they weren't so vague about the time frame. Maybe it is to encourage people to check and not assume they will not have problems, but in a situation like this, the more accurate a picture I have of what is going on, the better I feel.
Re: (Score:2)
roughly 30 kernel 0dayz circulating (Score:2, Interesting)
I can confirm that roughly 30 kernel 0dayz circulate in the underground. Working for all kernelz 2.6.X up to 2.6.27-rc3 :)
happy birthday.
Re: (Score:3, Funny)
Nice. I just compiled 2.6.27-rc4 on my notebook so I guess I'm safe for now. ;)
Suuure... (Score:2, Funny)
"Just run this shell script to verify you're not infected"
No way I'm falling for that one.
Back to work.
"Compromised?" (Score:5, Insightful)
My hats off, though, to the Red Hat folks. Full disclosure and immediate positive action speaks volumes.
On a related note, you should not use Fedora in a production environment anyway. That's what RHEL is for. Fedora = Testing. RHEL = Stable. At least in theory.
Re:"Compromised?" (Score:5, Informative)
On a related note, you should not use Fedora in a production environment anyway. That's what RHEL is for. Fedora = Testing. RHEL = Stable. At least in theory.
I thought it was, RHEL == RedHat Support, Fedora == Community Support. Fedora might have some bleeding edge stuff in it, if you upgrade often, but it seems about as stable as the corresponding RHEL release. The difference is the support you can count on.
Re: (Score:3, Informative)
Re: (Score:2, Informative)
Well, RHEL also mantains a stable kABI within the entire major release, and only rebases packages when absolutely necessary (maintaining most library ABIs as well). For example, RHEL 4 ships apache 2.0.52, and has since launch. Security and bug fixes are backported, but the fundamental behavior remains the same for any instance of RHEL 4. This is also true of libraries.
This means that a given piece of 3rd-party software is more likely to keep working after an update in RHEL than in Fedora.
Re: (Score:2)
I thought it was, RHEL == RedHat Support, Fedora == Community Support. Fedora might have some bleeding edge stuff in it, if you upgrade often, but it seems about as stable as the corresponding RHEL release. The difference is the support you can count on.
I thought that too, but I was wrong, and it bit me in the ass. Fedora is NOT appropriate for a production environment, period. Fedora drops all support 13 months after release, which means they stop issuing security patches, period. In a production environment where you're likely to have 13 month uptimes, that would mean a reinstall every time you reboot the machine.
If you want a RedHat-based distro with long-term community support, the one you're looking for is CentOS, or so I'm told. For your desktop
Re: (Score:3, Insightful)
Re: (Score:2)
Your theory fails on its first test because of the little detail that only RHEL appears to have been compromised and not Fedora.
Re: (Score:3, Informative)
From the Fedora advisory: "Among our other analyses, we have also done numerous checks of the Fedora package collection, and a significant amount of source verification as well, and have found no discrepancies that would indicate any loss of package integrity."
From the RHEL advisory: "Based on these efforts, we remain highly confident that our systems and processes prevented the
Re: (Score:2)
It seems neither OS's repositories were compromised.
Fedora is changing their key as a precaution "because Fedora packages are distributed via multiple third-party mirrors and repositories". While it seems Red Hat doesn't care as much about people getting packages from non-RHN sources, so they just issued an advisory.
Your two statements seem to contradict each other, if you consider the third-party mirrors and distribution sources as "Fedora" repositories.
Re: (Score:2)
The Fedora repository and signed packages may or may not have been compromised. RHEL packages are believed to be safe. Ergo, it's not much of an issue for production (read: critical) servers, since they should not be running a non-production distro.
Not Time for A Distro War (Score:5, Insightful)
Pretty sure most of us are above this anyway, but let's avoid a distro flamewar. You can look through my past comments and see that RH is far from my preferred distro, and I love to take shots at them. But now is not the time. Anyone can get hacked, and it sucks. And they're being responsible about reporting and mitigating.
Godspeed, gentlemen.
Uhm... How? (Score:5, Insightful)
I really only care to know HOW the attacker got in.
Basically, if he used unknown 0-day and RH/Fedora have no idea what he exploited, then they should say so, so people can watch out.
If he stole username/password from someone dumb - say so.
If he walked into the hosting center, say so.
I REALLY want to how know he compromised their server(s).
I might be next v0v
What the compromised packages contained? (Score:3, Interesting)
Our RHEL5/x86_64 system has been affected by this problem: I have ran the script from Red Hat openssh blacklist page [redhat.com], and found that all four openssh packages (openssh, openssh-clients, openssh-askpass, openssh-server) had their checksum on the blacklist. I took the server down, created a backup snapshot of the root disk, and I am currently reinstalling it, while checking other volumes and the root volume snapshot for any signs of intrusion.
The most annoying thing is that Red Hat remains silent on the main problem: what the compromised packages contained, how to determine whether the possible attacker exploited the access offered by those packages or not, when exactly were the packages signed, what other precautions to do on other servers (notify users which use the same password as on a compromised server, check for other modified binaries, etc.). I have verified that I had a trojanized binaries on my system, but apart from that, it is not clear what else the possible attacker managed to do.
Red Hat says the packages were not distributed over RHN, so I wonder how I got them. I had another repository in my yum.conf: rpmforge. Maybe this was the source of the malware. My syslog (even a copy on a syslog server) did not say anything about upgrading openssh in the last month or so. However, on Aug 15 it upgraded the YUM RHN plugin. On the same day our dovecot stopped responding, saying the time went backwards (and yes, there was time move several weeks back and then forward, according to dovecot log). Also the rpm -qi said the package was built on Aug 13 13:13:03, and signed five minutes later. However, the install time reported by rpm on my system was July 25 (which would corelate with the time slip reported by dovecot).
Did anybody else met the trojanized openssh mentioned in the advisory? Please share your findings.
Posting as AC for obvious reasons, sorry.
Re: (Score:2)
I hadn't heard of SSHguard [sourceforge.net], but I do use fail2ban [fail2ban.org].
Any thoughts on which is better SSHguard or Fail2ban ?
Does anyone know of a simple SSH honeypot that looks like a ssh server, but just logs the IP address, usernames and passwords that the robots are trying to use ?
Re: (Score:2)
Does anyone know of a simple SSH honeypot that looks like a ssh server, but just logs the IP address, usernames and passwords that the robots are trying to use ?
grep /var/log/access.log
Re: (Score:2)
I meant something like this kojoney [sourceforge.net] that pretends to be a ssh server but isn't.
Re:Probably a dictionary user/passwd (Score:4, Informative)
the most likely attack was probably from those lame SSH dictionary scans on port 22. This is usually just an extreme annoyance to admins who must provide port 22 service and haven't heard of 'SSHguard'.
Or just use SSH key authentication, this is what it's for. Anyone clever enough to use SSH on a redhat project server should be able to manage key authentication.
Re: (Score:2)
Per http://orcorc.blogspot.com/2008/08/cve-2007-4752-and-centos.html [blogspot.com] via http://planet.centos.org/ [centos.org]:
This is Russ Herrold's blog, so you can consider it authoritative. I think that this announcement has become the channel MOTD on #centos as well.
Executive summary: They're aware of the issue and examining their stuff to see whether they got bit