More trojan horse issues 50
Linux Weekly News is
reporting more trojan horse activity, this time hitting
util-linux.
Looks like someone read that
Bruce Perens Article.
Assume that win.tue.nl is not safe for the moment.
"Pok pok pok, P'kok!" -- Superchicken
Why just UID and hostname? (Score:1)
And anyway, this is illegal crackery--I hope that someone has told Hotmail about it. If the Scientologists can get penet.fi shut down for some (arguable) copyright violations, Hotmail (Microsoft) might be a bit leery of actual illegal activity using their equipment. Maybe they could track this guy and give him the hose.
question (Score:1)
I'm not Matts - slashdot login security bug? (Score:1)
Bruce Perens
We should solve this! (Score:1)
Why don't we have ftp servers where before you can change things on the server, you have to get a control file with random data, then put it back pgp signed?
This can be made to work with regular old ftp clients. But has anyone done it?
Another point is that this attacker is really stupid. We see this attack. We will have to tighten up, but not many will be compromised.
The attack that I am concerned about is someone slipping in key patches with buffer overflows. None of these obvious holes. Just something that looks like a common mistake which just happens to open up an exploitable hole. Want to bet that the maintainer would catch every hole submitted? Are there no buffer overflows now? Hmmm..
Ben (too lazy to sign in) Tilly
Could this create a PR nightmare for Linux? (Score:1)
"Look, we told you you could never trust those OSS flakes! Download OpenSource software and you will compromise your systems!"
Once Fear, Uncertainty and Doubt about the security and "cleanliness" (sp ???) of OSS is seeded in the minds of those who are in power,
Once a perception that OSS is not kosher becomes shared by enough people,
Linux's goose might be cooked.
Now, tell me, who has the most to loose if Linux *really* takes off? Who has the mose to gain to lead people to beleive that OSS is a security/reliability risk?
Considering this company has modified its GUI to break DR-DOS, that it is working on sabotaging QuickTime (IE/Mac 4.5 apparently installs an obsolete QT extension), that this is the company where it was once said "DOS isn't done until Lotus won't run" (when they had hopes for Multiplan against 1-2-3), I'd say that there is a strong chance M$ is behind this.
I do hope I'm wrong and that this is just one little a**hole's handywork. Because the prospect of M$ engaging in S/W guerrilla with the OSS community scares the sh*t out of me.
Bruno Majewski
bruno@pubnix.qc.ca
Heh, for lovers of NT, NetBus is everywhere (Score:1)
For anyone comparing NT to this:
Latest versions of NetBus can't be detected by
any of NT's vaunted virus scanners.
NetBus is all over my school's computer labs.
NT passwords are a dime a dozen in public computer
labs.
This is what I've seen:
NetBus cracker sits in back of lab with NetBus
installed on many systems. Waits for prey to
log on to a system. He/she is of course getting
all keyboard activity from all of the infected
systems. NetBus cracker waits for an admin to
logon to one of the infected systems. Admin
password is then compromised.
Schools and The Media don't seem to care that
there is no such thing as a secure NT publically
used network.
I just feel bad for all those people who are
having their email read and personal files
inspected.
WARNING: ECS GmbH, Switzerland [193.134.251.17] (Score:1)
Somebody is using ECS GmbH network to probe external hosts:
Jan 11 04:55:32 localhost portmap[4783]: connect from 193.134.251.17 to dump (): request from unauthorized hostinetnum: 193.134.251.0 - 193.134.251.255
netname: ECS-NET
descr: ECS GmbH
descr: Gossau, Switzerland
country: CH
admin-c: RK320-RIPE
tech-c: RK320-RIPE
tech-c: MD142-RIPE
changed: hostmaster@switch.ch 961024
source: RIPE
route: 193.134.0.0/16
descr: Unisource Business Networks Switzerland
descr: UBN-CH-AGGR.5
origin: AS3303
mnt-by: CH-UNISOURCE-MNT
changed: bridge@unisource.ch 971001
source: RIPE
person: Rene Kueng
address: ECS GmbH
address: Poststr. 4
address: CH-9200 Gossau
address: Switzerland
phone: +41 71 380 0042
fax-no: +41 71 380 0044
nic-hdl: RK320-RIPE
changed: hostmaster@switch.ch 961024
source: RIPE
person: Martin Doerig
address: ECS GmbH
address: Poststr. 4
address: CH-9200 Gossau
address: Switzerland
phone: +41 71 380 0041
fax-no: +41 71 380 0044
nic-hdl: MD142-RIPE
changed: hostmaster@switch.ch 961024
source: RIPE
traceroute to 193.134.251.17 (193.134.251.17): 1-30 hops, 38 byte packets
1 xx.xx.xx.xx 0.20 ms
2 xx.xx.xx (xx.xx.xx.xx) 2.5 ms (ttl=63!)
3 xx.xx.xx.xx (xx.xx.xx.xx) 3.1 ms
4 xx.xx.xx.xx (xx.xx.xx.xx) 8.5 ms
5 ny-backbone-1-gs010.router.demon.net (158.152.0.222) 48 ms
6 nj-backbone-1-gs000.router.demon.net (195.173.173.2) 78 ms
7 209.67.27.210 (209.67.27.210) 111 ms
8 jcnj-01-f-0-0.core.exodus.net (209.185.185.130) 109 ms
9 bbr01-p0-0.jrcy01.exodus.net (209.1.169.193) 108 ms
10 bbr01-p5-0.hrnd01.exodus.net (209.185.249.214) 134 ms
11 dcr01-p12-0-0.hrnd01.exodus.net (209.185.249.25) 259 ms
12 mae-east-h2-1-0.exodus.net (209.1.169.161) 113 ms
13 mae-east.telia.net (192.41.177.122) 206 ms
14 209.95.128.38 (209.95.128.38) 134 ms
15 ny-i7-feth2-0-int.newyork.telia.net (209.95.128.69) 144 ms
16 ny-i2-atm6-0-0-1-int.newyork.telia.net (209.95.128.245) 143 ms
17 164.128.33.205 (164.128.33.205) 240 ms (ttl=243!)
18 i79zhh-020-FastEthernet6-0-0.unisource.ch (164.128.36.3) 133 ms (ttl=243!) BR> 19 164.128.99.62 (164.128.99.62) 145 ms (ttl=242!)
20 *
21 *
22 *
23 *
24 *
25
(interrupt)
Sigh (Score:2)
Seriously people, whether you like the products, or the marketing, doesn't change the fact that most people at MS are good natured, smart, and usually kind people. Just cause we got quite a few unethical assholes around in marketing, doesn't mean we are all evil people. Has anyone here who claims the first sentence to be true ever met anyone from MS? It might change your perception of the people who work there a bit.
I've worked for MS Research for a few years, and have used Linux since 1992.
I can say for a fact that nobody i've ever met would dream of doing something like this.
Even the MS zealots who are around wouldn't try to do this, because in the big scheme of things, who the hell cares? What do you win? 15 years in a federal prison?
There are quite a few linux users around MS.
There's also quite a few people who contribute to open source projects.
At least at MS research, they could care less about it, too. It's not discouraged at all. We get paid to Research, not run NT.
We've got researchers whose research mainly involves (and involved before coming here) creating netscape plugins on UNIX machines. Nobody even batted an eye at that one. Most of us are atheistic when it comes to OSes, and will use whatever the hell works best for us. Do you think the Windows police come running in with electromagnetic guns threatening to destroy our hard drives if we don't install NT?
Most of you have a seriously screwed up view of how MS works.
On a random subject, since no rant would be complete without a tangent, IMHO, it'd be funny if they broke MS up, cause nothing would change. There is no communication between product groups as it is. Really. I still can't understand how anything gets developed at all around here, or any sharing occurs (actually, i do know this one. It happens because the idea is to see if you can reuse as much as possible of supposedly working tested parts from other apps before having to redo in a new app)
They actually set up internal help lists for most products, because if say someone from the NT5 team emails the Visual C++ team to ask a question, the odds of getting an answer are about the same as Steve Jobs getting his head out of his ass.
Probably worse (if thats possible).
Most people seem to think there is some inter-group communication and collaboration on design or something.
That cracks me up.
If only they knew.
Anyway, thats enough of a rant for now, i'm afraid if i type any more, Win98 will run out of system resources and crash.
(Incidentally, inside MS we bash some of the cruddy shit produced even more than people on slashdot do. It's hard not to make fun of things like shipping a zero bug release by moving 8000 bugs from priority 1 and 2, to priority 3 and 4.)
Mirror, mirror.... (Score:1)
Mirroring software must check PGP signatures.
Hell, the FTP sites must check PGP sigs.
And the installation software must check PGP sigs.
Bruce Perens is quite right that crypto is the solution.
Microsoft (Score:1)
Microsoft Encryption [min.net]
How i like to kill. (Score:1)
This is just INSANE
What the hell is wrong with people? if the person who did this is reading, HA HA HA.
If only these people could just die.. unfortunatley we cant kill people with the flick of a finger.
Im willing to bet that theres a group of lamers in some leet-o channel laughing about this too.
im glad i didnt get the g update.
Whats next, personally editing all the source code!?
Conspiracy Theory (Score:1)
I haven't read every comment in response to the BP Trojan article, so this may have already been mentioned...
A trojan attack against an Open Source codebase could be staged, not only by individuals, but by corporations that perceive OS as a threat to their proprietary interests. You can plug in the name of the corporation of your choice...I'm thinking of one right now...
Hagbard
Hotmail (Score:1)
Also - I think it's hugely worrying that this is happening to open source software. You sort of expect it from binaries, but with source code you don't expect to have to check it for trojans. This is a sad day...
--
Could this create a PR nightmare for Linux? (Score:1)
I don't think it was MS. For one, the trojan itself is pretty benign. As someone pointed out, this looks more like proof of concept, or a warning.
See my response to the "Why just UID and hostname" thread above. This trojan is most definitely NOT benign; it grants anyone a root shell on login.
Hrm... This reminds me - I got an attempted connection from someone at [name withheld].akh-wien.ac.at yesterday shortly after I dialed in (dynamic IP). I wonder if that indicates that that machine was hit by this, or more likely that someone else using JHU's ppp service got bitten.
Damn.. (Score:1)
Great, I don't even know C... I guess I'm grepping for "hotmail.com" from now on..
Innocence Lost (Score:1)
Just the excuse I need to spend a Sunday afternoon tightening down my system like Fort Knox.
What a pain in the arse. (Score:1)
Ignore trolls! (Score:1)
I'm not Matts - slashdot login security bug? (Score:1)
Maybe a problem with cachedot?
No, you need a digital signature, not just md5. (Score:1)
Bruce
Not quite enough (Score:1)
Check out how Debian handles this - project-wide key files, cross-signing by a trusted "security" key, automatic crypto and MD5 checks on uploads. This is what everyone needs to do.
Bruce
We know what to do (Score:2)
We know how to handle this. Cryptographicaly sign everything, have good cross-signings on your keys, and check the signatures when you download.
A tool to automate signature checks during downloads might be nice.
Bruce Perens
Quick exposure of problems is a bad thing?? (Score:1)
What counts is not the number of security vulnerabilites listed on security/hacker sites, but the damage done when those vulnerabilities are exploited.
With open source, vulnerabilities are spotted quickly and publicized widely. This reduces the chances of real damage - if system administrators are paying attention.
Linux system administrators (including me) will have to be especially careful in coming months, as Linux begins chomping up market share. Lots of angry, envious twerps will be out there looking to bring about a widely publicized security 'incident' to cast aspersions on the viability of Linux and OSS in general.
-Doug
Hmm, any way to authenticate? (Score:1)
This opens up a whole big can of worms. We need more/bigger use of digital ID's and signing of documents to verify that people are really who they say they are.
This could take away some of the credibility of OSS if we don't find some way to curtail this.
Imagine if a news source jumped on this and gave these problems the wrong kind of spin?
Ben
Not a new problem... (Score:1)
See, what we need, is a centralized server, that is highly secured, that carries md5sums for all major Linux system software, that can be trusted. Now, this means treating it the same as a really huge kerberos keyserver... if someone DOES compromise it, we're in trouble.
Why just UID and hostname? (Score:1)
How do we know Microsoft wasn't responsible?
--
Conspiracy Theory: MSft sabotages Linux? (Score:1)
Which brings up an interesting point. Is it necessarily illegal to put trojan horses into a public open-source project? All of this stuff is 'Use at your own risk' anyway...
Moron AC.. (Score:1)
Argh... (Score:1)
- Slarty
Anyone fancy setting up a trap? (Score:1)
The account for wlogain@hotmail.com [mailto] still exists, something I've just confirmed with the help of my own hotmail account ;-)
Someone could do this: set up a Linux box w/o hard disk to boot over nfs off another machine. Then apply your patch and login to the machine. Eventually the rogue may (or may not) attempt to log into this machine, but that doesn't matther, cos it's got no hard disk and no one trusts it anyway. But he's on your spare machine and bingo you have his IP address. The harass the ISP enough and you have the culprit's real name and address in no time. Alternatively if you're not so good-natured you could try every possible attack on the machine. Gosh this sounds all too easy.
MD5 is not a security system (Score:1)
It's reviewed.. (Score:1)
comprehensive source reviews often enough"
Well I must admit that I don't read the full kernel source when
there's a new version, but at least I read every single patch file
and I've read all of them since early '92. Lately I've stopped
reading most of the new m68k stuff etc., concentrating instead
on the platforms I use. So at least it isn't so easy to place any trojan in the patches.
I know that many many other people also read all the patches, and there sure are
a lot of people looking everywhere in the kernel whenever there' a new version.
hotmail is owned by microsoft..... (Score:1)
nuf said....
No, a trojan like any other (Score:1)
But... (Score:1)
As for inexperienced sysadmins... well, if you use linux, I'd think that with the money saved you could get yourself a more experienced sysadmin, which would be better in the long-run anyway. As you said, NT looks pretty good "on the surface".
saw trojaned site this aft while kernel hunting.. (Score:1)
It is unfortunately easy to simply click and download the files when you come from a reference page (for example, linuxhq), without getting a chance to verify the files. Luckily the links are a bit stale..