Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Security Linux

Linux Foundation Sites Restored 141

LinuxScribe writes "The Linux Foundation has quietly restored all of the websites it took down following the September 2011 breach that affected Linux.com and all other Foundation websites--an attack that was linked to the August 2011 breach of kernel.org. But one website won't be coming back: the Linux Developer Network, launched in 2008. Content from the site will now be hosted across all of the Linux Foundation's web properties."
This discussion has been archived. No new comments can be posted.

Linux Foundation Sites Restored

Comments Filter:
  • by Anonymous Coward

    ...is still down, which is IMHO a huge problem for the Linux kernel as bug reports (and even patches) just vanish into thin air...

  • by benjymouse ( 756774 ) on Wednesday January 04, 2012 @09:58PM (#38591660)

    Why has the Linux Foundation not offered an explanation for what went wrong and how the intruders gained access? Specifically, how could the intruders root the servers starting from compromised user credentials as has been alleged?

    • by Anonymous Coward

      Normally when there is a breach in any system the companies keep all of the details quiet, unless the breach affected costumer, user, or employee data. With that said just be happy that they haven't released that much information about the attack because that means they already know who did it, the breach was limited, or it will not affect the community at all once the sites are fully restored.

    • by julian67 ( 1022593 ) on Wednesday January 04, 2012 @11:33PM (#38592304)

      I strongly agree. They promised they would publish an account but so far have failed to do so. On kernel.org they wrote "We will be writing up a report on the incident in the future." but I suppose "the future" in this case translates to "never" or even "mind your own business because it's embarrassing".

      They are also still using a signing key which has been publicly stated to be compromised. From http://kernel.org/signature.html [kernel.org]

      "The current Linux Kernel Archives OpenPGP key is always posted here, including any revocation certificates which may be outstanding on older keys.

      This signature does not guarantee that the Linux Kernel Archives master site itself has not been compromised. However, if we suffer an intrusion we will revoke the key and post information here as quickly as possible."

      I find it amazing that after over 4 months this simple act of revoking the bad key has still not been carried out. Even though a signed tarball doesn't guarantee much in the end, the fact that an important organisation can publicly make such a statement and then fail to honour it is actually disgraceful. It's a demonstration of bad faith in itself, and in combination with their failure to be frank about how root was gained on multiple sites and servers, is an indication of untrustworthiness of the most uncomplicated type.

      Claiming to be open and honest is in no way a satisfactory substitute for being open and honest.

    • Maybe the reason they do not comment is that the servers were not Linux ones. Or, the way the hackers got in is not yet determined.

  • Seriously, it's time slashdot implemented an apk filter. If your spam filter allows trolls like him to shit all over a discussion, it ain't working. IP Blocking == fine with me.

  • ... the security breach was internal. That would explain their reluctance to comment on this breach in detail.

The relative importance of files depends on their cost in terms of the human effort needed to regenerate them. -- T.A. Dolotta