Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security GNU is Not Unix Software Linux

Gentoo rsync Server Compromised [updated] 600

costela writes "LWN points out that the Gentoo project fired out an alert about one compromised rsync server." From the message itself: "However, the compromised system had both an IDS and a file integrity checker installed and we have a very detailed forensic trail of what happened once the box was breached, so we are reasonably confident that the portage tree stored on that box was unaffected." Update: 12/03 22:54 GMT by T : One more damage report: gibson writes "The Free Software Foundation recently discovered that its software host site was compromised a month ago. The compromise appears to be the same as the recent attacks on the Debian servers. The site is shut down until Friday while they install replacement hardware and verify the authenticity of the hosted source code."
This discussion has been archived. No new comments can be posted.

Gentoo rsync Server Compromised [updated]

Comments Filter:
  • well... (Score:5, Insightful)

    by neo8750 ( 566137 ) <zepski&zepski,net> on Wednesday December 03, 2003 @03:54PM (#7621126) Homepage
    who didn't see this coming? I use gentoo and i figured it was a matter of time before someone did this. I mean haveing a central tree is cool but it does make it more of a target for attacks. I am however glad to see that they took precautions.
    • Exactly. (Score:5, Funny)

      by twoslice ( 457793 ) on Wednesday December 03, 2003 @04:05PM (#7621282)
      I am however glad to see that they took precautions.

      Now consider what would happen if the Windows update service was compromized and hackers managed to get past Microsoft's tight security. These update servers could be used for WMD's (Windows Massive Disruptions)...

    • Re:well... (Score:5, Insightful)

      by ballyn ( 324451 ) on Wednesday December 03, 2003 @04:14PM (#7621395)
      Luckily this "central tree" is actually a distributed mirror, so a simple emerge sync will get your portage tree back in shape if you're one of 20 or so people who happened to sync to this server after it was compromised...
      • Re:well... (Score:5, Interesting)

        by Anonymous Coward on Wednesday December 03, 2003 @04:24PM (#7621510)
        And what if syncing to the server installed a compromised "emerge" program?
        • Re:well... (Score:5, Insightful)

          by Theatetus ( 521747 ) * on Wednesday December 03, 2003 @04:29PM (#7621553) Journal

          Somebody mod that tinfoil-hat-wearing parent post up.

          Download gentoolkit and emerge from a current server and validate the checksum. Manually build them. Then emerge sync. Then emerge -u world. Anything less is just trusting that the attackers couldn't cover their tracks well.

          • Re:well... (Score:3, Informative)

            by FxChiP ( 687923 )
            ... No modding up necessary.

            emerge sync doesn't touch emerge. Basically, all emerge sync does is get a listing of the Portage tree and fetch the latest ebuilds, and delete whatever is old. The only thing emerge sync does in relation to emerge itself is tell you that a new version is available if there is one.
        • Re:well... (Score:5, Interesting)

          by unixbob ( 523657 ) on Wednesday December 03, 2003 @04:59PM (#7621902)
          Even if you didn't RTFA, at least RTFP.

          However, the compromised system had both an IDS and a file integrity checker installed

          The file integrity checker will have provided a list of the files that changed and if emerge was compromised then Gentoo would have let you know. After all, they haven't kept the compromise quiet so presumably they are informing users to let them know the Gentoo are on top of things.
    • Re:well... (Score:3, Interesting)

      by Amgine007 ( 88004 )
      And who doesn't see this coming again? All you need is a box with some bandwidth, and you can become a gentoo mirror.

      Now, you want to compromise every gentoo box on the planet? Edit any ebuild you want to add your compromise. Make it break out of the gentoo sandbox and erase that system straight from the ebuild. Or make it install a tainted binary. Whatever, just be sure to re-hash your ebuild in the Manifest, and wait for some poor suckers to download it. Given the frequency with which gentooer's rsync, t
      • Re:well... (Score:3, Interesting)

        by Xabraxas ( 654195 )
        Edit any ebuild you want to add your compromise. Make it break out of the gentoo sandbox and erase that system straight from the ebuild. Or make it install a tainted binary.

        You make it sound so easy. Just "break out" of the sandbox and erase the system. No system is ever going to be 100% secure, but things like sandboxing make it safer. I'll take my chances with Gentoo. The RPC exploits alone have convinced me to never even look at a Windows box again. It's just too much hassle.

  • All this bad news. (Score:5, Interesting)

    by iantri ( 687643 ) <iantri@@@gmx...net> on Wednesday December 03, 2003 @03:54PM (#7621128) Homepage
    Lately there has been a lot of bad news about Linux.. SCO, Red Hat's discontinuing of the Red Hat Linux line, the Debian server compromise.. now this.

    A conspiracy theorist could have a field day..

    Now where did I put my tin-foil hat?

    • by bytesmythe ( 58644 ) <bytesmytheNO@SPAMgmail.com> on Wednesday December 03, 2003 @03:58PM (#7621189)
      Don't forget when gnu's servers were compromised a few months back...

      A conspiracy theorist could have a field day..

      Is it sad the first thing that crossed my mind was "lots of well-timed security breaches... Microsoft may be behind them all"? ;)

    • Perhaps I'm wrong, but I believe you have no IDEA what you are talking about. There has been no more bad news than normal about linux. Again, perhaps I'm wrong, I'm always open to other's opinions. There always has been, and always will be, bad news about linux. Just like windows. And Macs, too for that matter. It's totally offtopic.

      Also, what does SCO have to do with the Debian Server compromise? those are two TOTALLY different subjects. You can't group them all in the same "bad news" categories! One has
      • by iantri ( 687643 ) <iantri@@@gmx...net> on Wednesday December 03, 2003 @04:02PM (#7621239) Homepage
        Also, what does SCO have to do with the Debian Server compromise? those are two TOTALLY different subjects. You can't group them all in the same "bad news" categories! One has to do with security, the other with the corporate-world.

        Yes, I can. Both give Linux a negative image to people that aren't as clued in about this sort of thing, which is were Linux needs the most support.

    • by penguin king ( 673171 ) on Wednesday December 03, 2003 @04:17PM (#7621424)
      Yeah... it was probably SCO: "ooops.... I think I hacked someone" "shit.. what now?" "new lawsuit.. they're runing our rootkit!"
    • by mr_z_beeblebrox ( 591077 ) on Wednesday December 03, 2003 @04:33PM (#7621592) Journal
      A conspiracy theorist could have a field day..

      Uh....Ok. I'll bite. Top three theories about why all the Linux bad news.
      Number 3: Some companies that got in early on are outgrowing their business models and thus adapting.
      Number 2: Some companies with REALLY flaky software and business models are trying to figure out how to use other peoples superior software to increase their own revenue.
      The number 1 reason....: How much fun can it possibly be to say "I did a google search on Windows Exploits and owned 1000 boxen in just under an hour" as opposed to " I heard about an SSH2 compromise and searched for 2 weeks and found an affected system, gained access. Found another program with an exploit kit, eventually gained root. All in all it took a week."
  • How do they know? (Score:2, Insightful)

    by iantri ( 687643 )
    "However, the compromised system had both an IDS and a file integrity checker installed and we have a very detailed forensic trail of what happened once the box was breached, so we are reasonably confident that the portage tree stored on that box was unaffected."

    IANAH (hacker), but isn't the first thing you do when you break into a system to 'fix' the logs?

    How can they guarantee the tree hasn't been affected? Compare it with another copy?

    • Re:How do they know? (Score:5, Informative)

      by Feyr ( 449684 ) * on Wednesday December 03, 2003 @03:59PM (#7621198) Journal
      remote logging
    • by mahdi13 ( 660205 )
      You can 'fix' logs, but you can't fix all the md5sums that are scattered around the internet
    • by agurkan ( 523320 )
      An intrusion detection system, e.g. snort, can send the logs offsite, so compromising a machine does not always allow you to wipe the logs. The people who administer these machines probably know what they are talking about, and they have little incentive wrt prop. software guys to lie about their system safety. Debian guys came forward with all details, I believe Gentoo people would not tell lies about security breaches either.
    • by DA-MAN ( 17442 )
      I don't know about this specific setup, but it is standard operating procedure to set up a bastion (read hardened) host that just runs syslog and nothing else for the purpose of logging what goes on in a central location.

      In addition, they can just rsync the portage stored on that box to another to see if any changes were made.
    • By "file integrity checker" I presume they mean something like AIDE [cs.tut.fi].

      One makes hashes of each file and stores them on a non-networked system and/or read-only media. Then periodically runs a check (hopefully from a statically linked binary that is also on RO media) on the files and compares the hashes.

      If they match (and any number of other conditions are met, like the machine and the media the hashes were stored on are physically secure, etc.) you can say with reasonable certainty that the files are unmole
    • IANAH (hacker), but isn't the first thing you do when you break into a system to 'fix' the logs?

      Yes, but I think SOP would be to do a little Jedi handwaving "There was no breach". So if they have a good forensic trail, it's either a) real or b) fake. But why create a fake one, if they could have erased it properly? The only reason would be to hope that the box would be apparently fixed, but in reality still rooted. However, as the article said, after the investigation is done it'll be wiped and rebuilt, w
    • by Our Man In Redmond ( 63094 ) on Wednesday December 03, 2003 @04:10PM (#7621342)
      I'd just set up a remote box specifically for logging and connect it to a cheapo dot-matrix line printer and have the logs printed to paper. Yeah, you might use a bunch of paper, but it also might come in real handy if you ever need to figure out what really happened to your box.
    • Seperate Log Server (Score:5, Informative)

      by EXTomar ( 78739 ) on Wednesday December 03, 2003 @04:21PM (#7621482)
      There is no sure thing in security but there is a simple step to make things a bit more reliable for logging.

      If you really have a serious system where you want detailed logs you keep the logs for that system off that machine. Sure the machine that is logging could have been comprimized as well but that is twice as much work. Now you have to hack the machine but also the logger to erase the intrusion event.

      In fact one of the things I've seen done is that events are logged on the machine and the logger. The idea was to provide not only redundant logging but also provide a front for hackers. A hacker would see the local logs and be too busy doctoring up those logs to check to see if there is an external logger.

      In any event, the logging Gentoo did looks complete enough. They claim only 20 users did a sync against the server during the hour it was online and comprized.
  • by msimm ( 580077 ) on Wednesday December 03, 2003 @03:57PM (#7621176) Homepage
    Either hackers have decided they *hate* OSS (not likely) or someone is putting up a purse trying to damage the OSS communities security image.
    • by molafson ( 716807 ) on Wednesday December 03, 2003 @04:09PM (#7621326)
      Either hackers have decided they *hate* OSS (not likely) or someone is putting up a purse trying to damage the OSS communities security image.

      Or (C) None of the above. To want to crack something you don't need to hate it (or to be paid to hate it). The possibility of finding vulnerabilities is tantalizing enough on its own. To crack something that big would be a major black-hat ego trip, don't you think?
    • Either hackers have decided they *hate* OSS (not likely) or someone is putting up a purse trying to damage the OSS communities security image.

      Well, everytime there's a major windows exploit you always hear "blah blah, Linux, blah blah BSD, blah blah OSX." Maybe the hackers are just looking for a new way to prove their "l33t h4x0r1ng sk1llz."

      -sam

    • by CFBMoo1 ( 157453 ) on Wednesday December 03, 2003 @04:19PM (#7621454) Homepage
      I think part of this can be attributed to the fact that OSS and Linux is gaining popularity. While it isn't probebly the whole reason, there is a certain amount of truth to being in the spot light more and being a bigger target. I'm sure there will be more of these stories in the future. It's only natural to get more attention when you winning a popularity contest. :)
      • Hypocrisy alert (Score:4, Insightful)

        by Overly Critical Guy ( 663429 ) on Wednesday December 03, 2003 @06:19PM (#7622720)
        I love it.

        I've pointed out before that Windows is way more widespread than Linux, and so is more attacked and vulnerable, but then zealots come on and say Apache is the most-used on the net and yet not the most breached. But to this [about.com], it's already the most-breached operating system.

        Hoot and holler about the reasons all you want, but them's the facts.

        We REALLY, REALLY need to stop with the "Linux is invincible, Windows sucks" attitude. It's flat-out not true, and it's severely holding the community image back in the minds of the rest of the rational computing world who just uses what they use to get the job done and don't treat operating systems like religious belief systems.
        • Re:Hypocrisy alert (Score:3, Interesting)

          by dmaxwell ( 43234 )
          ...and don't treat operating systems like religious belief systems.

          I really don't want to be a smartass here but could this be a case of the pot calling the kettle black? You don't seem at all Overly Critical when something bad happens to Windows. Indeed, your posting history is largely criticisms of Linux. I could exchange every instance of Windows and Linux in a typical posting of yours and you would come off exactly like one of the "Linux religious fanatics" you claim to be above.

          You also seem to t
  • Deliberate attacks? (Score:5, Interesting)

    by Realistic_Dragon ( 655151 ) on Wednesday December 03, 2003 @03:59PM (#7621204) Homepage
    I just threw away my tinfoil hat and made a new one out of steel. With a spike on top.

    Once is happenstance, twice is coincidence, three times is some one playing silly buggers.

    (Kernel.org, debian.org, gentoo.org - all in the same two months?)
    • The gnu servers too, not too long previous, iirc.
    • by EvilTwinSkippy ( 112490 ) <{yoda} {at} {etoyoc.com}> on Wednesday December 03, 2003 @05:11PM (#7622011) Homepage Journal
      You see it every few years. I remember back in '98 everyone was getting rooted because of bugs in named. Later it was Apache. They come in waves as the crackers figure out new patterns of exploits, and like all of the other "fad" break-ins they are going to come to a crashing end after a quick code review.

      Whoever is behind this is showing off for sure.

    • I think the moral of the story is not to have a .org top level domain.
  • by Anonymous Coward on Wednesday December 03, 2003 @03:59PM (#7621205)
    They haven't had a break in two weeks!
  • by Goyuix ( 698012 ) on Wednesday December 03, 2003 @04:00PM (#7621213) Homepage
    Any bets on which major distro will be next? Better yet, instead of point spreads on professional sporting events - Vegas should be taking bets on which distro (or well established free software org) gets rooted next...

    First Debian, now Gentoo... Slackware perhaps? Maybe install a spam-bot on a knoppix image?

  • GAAAAH!!!! (Score:2, Funny)

    by Enahs ( 1606 )
    I decided to switch away from using Gentoo (after I accidentally nuked my system for the 12th time, my fault) to Debian. The day afterward, they were compromised, and they still haven't gotten back to normal.

    Today, I decided that I wasn't entirely happy with Debian, and so I have Gentoo stage3 LiveCDs sitting on my desk, ready for an install when I get home...

    Maybe someone should start working on Desktop OpenBSD. :-P

  • by Chalybeous ( 728116 ) <chalybeous@@@yahoo...co...uk> on Wednesday December 03, 2003 @04:02PM (#7621243) Homepage Journal

    ... they DO have records of what was done and were able to isolate it pretty quickly. IMHO, that's probably saved them a lot of trouble.
    Whether it's because the cracker was sloppy or inexperienced, or because the Gentoo team have good server security, I can't say - but it seems they were pretty lucky compared to Debian.

    What baffles me is why crackers go after targets like this. I can understand anticapitalist stuff, but my intuition says someone trying to crack a *nix server and damage a distro must have detailed knowledge of *nix systems - and is therefore likely a user of an OpenSource operating system.
    Is that guess a little too far off base? If so, what's your take?

    • by zangdesign ( 462534 ) on Wednesday December 03, 2003 @04:13PM (#7621378) Journal
      What baffles me is why crackers go after targets like this.

      Because some individuals are asshats, that's why. You could create the cure for cancer and some asshole would try to shoot it down just because it's there. After all, we are the same species that nailed some poor bastard to a cross just because he said we should all get along for a change.
    • by Our Man In Redmond ( 63094 ) on Wednesday December 03, 2003 @04:15PM (#7621403)
      OK, I RTFA and it doesn't look to me like they were going after Gentoo specifically. The way I read it, this was just a box somewhere that a sponsor had set up to house a Gentoo rsync node, and had a bunch of other stuff on it as well. The box got rooted and the cracker didn't touch any of the other stuff on the box -- just what he needed to obfuscate his entry and do all the usual rootkit stuff.

      Why do they do this? Because they can. Personally, I blame that darn rap music.
  • by Anonymous Coward on Wednesday December 03, 2003 @04:03PM (#7621261)
    break in to Debian, it was notices within 24 hours. Break into Gentoo, noticed in 1 hour. Break in to Microsoft, not noticed for MONTHS.
  • by Nijika ( 525558 ) on Wednesday December 03, 2003 @04:03PM (#7621262) Homepage Journal
    These things just happen. What I'm more impressed with is the detailed reports of the breakins. I mean you're going to have compramises, if you're on the Internet, try as you might to stop them dilligently. The important thing now is making sure you know when somebody's on the inside when they shouldn't be. And even more props if you make the knowledge public so that it gets harder and harder to break in.

    To those who aren't intentionally trying to troll.. and computer journalists;

    Yes, Linux servers can be compramised.

    No, the sky is not falling.

    No, it's not the end of Linux or open source.

  • by phorm ( 591458 ) on Wednesday December 03, 2003 @04:07PM (#7621300) Journal
    Leading to the hacking machine? Fixing the compromises on major linux servers is one thing, but why has nobody mentioned finding the perpetrators?

    Anything in these logs on the source of the hacks? Probably another hacked machine, but perhaps it can be traced to a source.

    Also, in any package that were compromised or attempted at, what is being inserted? Perhaps we can use it as a honeypot to catch a hacker?

    Perhaps 2.4.23 should have a kernel allowance for a log that tells when somebody was trying to use the =2.4.22 exploit (or does it)?
    • by kasperd ( 592156 ) on Wednesday December 03, 2003 @06:36PM (#7622849) Homepage Journal
      Perhaps 2.4.23 should have a kernel allowance for a log that tells when somebody was trying to use the =2.4.22 exploit (or does it)?

      It doesn't have, but would be trivial to implement. Here is my suggestion how a patch [daimi.au.dk] for that should look (untested):
      diff -Nur linux.old/mm/mmap.c linux.new/mm/mmap.c
      --- linux.old/mm/mmap.c 2003-12-03 23:20:57.000000000 +0100
      +++ linux.new/mm/mmap.c 2003-12-03 23:23:22.000000000 +0100
      @@ -1059,8 +1059,12 @@
      if (!len)
      return addr;

      - if ((addr + len) > TASK_SIZE || (addr + len) < addr)
      + if ((addr + len) > TASK_SIZE || (addr + len) < addr) {
      + printk("do_brk: %d (%s): uid=%d euid=%d brk=%08lx\n",
      + current->pid,current->comm,
      + current->uid,current->euid,brk) ;
      return -EINVAL;
      + }

      /*
      * mlock MCL_FUTURE?
  • by Anonymous Coward
    I needed to upgrade my kernel and I'm guessing that by the now deathly slow speed of kernel.org, I wasn't the only one that remembered its time to get the latest stable. There should be a new name for this effect.
  • leads... (Score:3, Insightful)

    by happyfrogcow ( 708359 ) on Wednesday December 03, 2003 @04:08PM (#7621322)
    Leads? I'll just check with the boys back at the crime lab. They got 3 more detectives working on the case. They got us working in shifts!
    -The Big Lebowski


    Seriously though, I would hope that organizations like Debian or Gentoo would have the brain power and tech resources to find a few leads that results in arrests. But why do I doubt that anyone will ever be arrested for any of these types of attacks?
  • Some of us don't subscribe to lists, or don't check our list mails often.

  • This just means Linux is hitting the big times... :-)
  • so what was the remote exploit that was used?
  • by pete-classic ( 75983 ) <hutnick@gmail.com> on Wednesday December 03, 2003 @04:14PM (#7621388) Homepage Journal
    Does anyone have an old, cached copy of the DNS record for rsync.gentoo.org?

    Diff it against what's out there now and we're only a quick trip to http://arin.net/whois from knowing who it was . . .

    -Peter
  • by pair-a-noyd ( 594371 ) on Wednesday December 03, 2003 @04:17PM (#7621422)
    "I told you before to stop playing and go to sleep!
    You just wait until your father gets home!"

  • by tomstdenis ( 446163 ) <tomstdenis@gma[ ]com ['il.' in gap]> on Wednesday December 03, 2003 @04:30PM (#7621558) Homepage
    Why not?

    You take the keys of the developers [or even a cvs key] and then sign all the emerge files. There are only like 2000 new ones a day so at about 50ms a signature [for a really slow box] that's only 100 seconds of time [two minutes not much].

    That way if the end user downloads compromised emerge files they could detect them.

    Damn... I'm like a genius.
  • by Zapdos ( 70654 ) on Wednesday December 03, 2003 @04:31PM (#7621577)
    One of the servers that makes up the rsync.gentoo.org rotation was compromised. This box is not an official Gentoo infrastructure box and is instead donated by a sponsor. The box provides other services as well and the sponsor has requested that we not publicly identify the box at this time.

    While it may run Gentoo, it is not stated as such, and could be very well be something else.

  • by jmanning ( 174177 ) on Wednesday December 03, 2003 @04:36PM (#7621619) Homepage
    To correct a few misconceptions in the previous comments.

    It was not their server that was compromised, just a third party server in a round robin rotation. They don't own it, they don't maintain it - just someone else who donated server space.

    The primary or master server is not accessible to users, it was not compromised, and so none of the original source files had a chance to be changed.

    Only the 20 users that synchronized to this server even have a tiny chance of getting bad files. Having everyone sync now that this server is out of the rotation will immediately fix the problem.

    Full disclosure 24 hours later. I give them a lot of credit for such a quick response and disclosure. This is very, very minor.

    ~J
    • by Beryllium Sphere(tm) ( 193358 ) on Wednesday December 03, 2003 @07:29PM (#7623344) Journal
      Cars are built out of steel, not glass. Glass is a very strong material. But hit it with a hammer and it shatters. Steel just gets dented.

      Gentoo had "ductile" security. They were able to limit the damage because they had some kind of Tripwire/mtree-like program running on the inside. Given the speed of the response, my guess is that they had a response plan ready to go.

      The lesson is that measures to limit the damage from a break are as vital as measures to prevent breaks in the first place. Fire prevention doesn't substitute for sprinkler systems, and intrusion prevention doesn't substitute for backups. You've got to have both.
  • by Jumper99 ( 51637 ) on Wednesday December 03, 2003 @04:38PM (#7621639)
    So I've been lurking around here long enough to spot certain trends. (Warning: generalizations ahead)
    OSS advocates love to hate Windows
    OSS advocates gloat when a new hole turns up in Windows
    OSS advocates point to the number of worms, virus, etc in Windows and say, "Never us"

    Then several OSS distros have a security breach in a short space of time.

    OSS advocates respond with "Must be a conspiracy against us by some evil entity", "Hey, look how quick we caught it", "It would have been much worse with Windows".

    Time to face facts gents. Windows is attacked FAR more than OSS. Why? Well, yes, it is full of holes. But downtown Philly is riddled with abandoned houses with no locks on the doors but they never get broken into. Why? No value in doing so. Not enough damage, headlines, misplaced glory, etc. But the main reason is that it is the dominant OS out there. I fear that we will see more and more attacks against OSS with it's growing popularity. If we all get our wish and 'nix takes over Windows dominant market position and is running on 90% of desktops, you will most likely find it a target for constant attacks like Windows has now.

    We all know in order for 'nix to make it to the desktop, it has to become WAY more user friendly. Can't have Grandma trying to recompile the kernel now can we? User friendly unfortunately translates into users being able to do things that comprise security. Like opening attachments, downloading Trojans, etc. Then the great security built into the OS goes right out the window. no pun intended).

    So before you all start crying about conspiracies, et al, just remember that we all may be victims of our own push to make the 'nix stuff more popular. By bragging about how secure it is, we just may be attracting the type of attack that is more sophisticated then the script kiddies attacking Windows. I imagine it's cool to brag to your friends that you broke into a Windows box. I imagine it's much cooler to brag that your rooted a Linux distro. Badge of honor and all that.
  • Gentoo! (Score:5, Funny)

    by PatrickThomson ( 712694 ) on Wednesday December 03, 2003 @04:47PM (#7621752)
    rooted 1% faster than a binary install!

    With apologies to Torne, from whom I stole this quote.
  • When, not if (Score:5, Insightful)

    by Midnight Warrior ( 32619 ) on Wednesday December 03, 2003 @04:54PM (#7621836) Homepage

    IDS is placed on a system to follow an attack. Audit trails [busan.edu] on sensitive machines reveal all commands executed, to the detail you desire.

    Here is the point. Bruce Schneier says that the important part of security is not that you were compromised, but rather that you can react within a time frame to keep the damage to acceptable levels. If you can tolerate having your system compromised for weeks, don't invest in a lot of security. The short response time (2 hours at 11pmEST) here indicates that the Gentoo administrators care about responsiveness enough to check on it frequently.

    When the CVS gateway to Bitkeeper on the Linux Kernel was compromised, the developers of Bitkeeper were able to show that they care enough about security that they invested in many checks and balances that caught the error immediately. Since then, Bitkeeper developers, interested in protecting their good reputation (which is VERY difficult to replace), are considering even more drastic measures.

    As a bonus, some cracker spent a good few days or weeks writing this exploit. We get to keep it and deploy the solution with little hassle. And the compromised system, because good security practices are in place, was mitigated to minimize damage.

    Read Schneier's book Secret and Lies [schneier.com] to find out how security is really a process. Yes, I know it's a plug, but I just thought the book hit-home to the real point - "When, not if" you get compromised.

    Several other posts here hint that the world will think less of Linux for this. False. True CIOs should see that Linux has the tools to completely identify and contain attacks. Every CIO knows attacks cannot be stopped, but rather they must be contained to acceptable levels.

  • by EvilTwinSkippy ( 112490 ) <{yoda} {at} {etoyoc.com}> on Wednesday December 03, 2003 @04:59PM (#7621901) Homepage Journal
    I know I'm going to be modded into the basement, but does anyone else note the extreme difference between when the Debian server was rooted and the Gentoo? Gentoo knew in an hour. They had all of the monitoring tools installed. They even had a list of everyone who had pulled from the machine, and a rough idea of what was done and not done on the server.

    Good luck catching your buglar. I want to know how to patch my box.

  • by perf_monkey ( 719198 ) on Wednesday December 03, 2003 @05:05PM (#7621955)

    Let's face it, no OS is 100% secure. Operating Systems that are more secure than others still need to be on their toes. One security exploitation on a Linux box can still be as dangerous as a thousand (an underestimated ratio I'm sure) exploitations on a Windows box. However, I will take the body of security knowledge surrounding an OS to be as valuable as the initial security design principles in the OS in the first place; with that in mind, many Open Source OS's come out looking pretty good. I trust the Linux community to grind down and fix security problems and not sit around and emphasize the numerous security in a Microsoft product. If you're concerned, then help out developers by testing the software and reporting bugs. You could even code a few patches yourself, that being the whole point of community-based development.

    Whether or not there is a deep and dark plot to root big Linux boxes is irrelevant. This is another opportunity to demonstrate the Open Source community's response to security issues to the rest of the computing community. If the heat is really on and this is not just another artifact of news gatekeepers getting over-zealous on a trend, then so be it. It is an opportunity to review and evolve Linux's security as well as the security processes that surround it.

    One of the things I admire most about Linus Torvalds is his steadfast commitment to the quality of his product. It is a commitment that is focused on constant improvement, not PR damage control. I'm sure the real security guru's are sitting with a bit more comfort knowing their servers are running Linux.

    Disclaimer: This post contains no constructive content whatsoever, swallow two tablespoons of salt and call me in the morning.

  • by acidtripp101 ( 627475 ) on Wednesday December 03, 2003 @05:12PM (#7622028)
    The death of one is a tradegy, but the death of millions is a statistic

    For all of you that are curious, this isn't a BSD troll (although it could be...).
    My point here is that whenever a larger *NIX server is broken in to, there are ALWAYS people that comlain about "the insecurity of *NIX". Well, when ONE large *nix server is broken in to, it makes it to the front page of slashdot, whereas blaster/sobig/etc usually get a story or two.
    This is where the quote above comes into play.
    Linux might look insecure, but that's because we usually hear about breakins on a 1 server basis. When we here about Windows, it's usually in the HUNDREDS OF THOUSANDS (if not more). If there was a slashdot story for every one of THOSE servers, then it would appear the way it actually is.
  • by beattie ( 594287 ) on Wednesday December 03, 2003 @05:19PM (#7622096)
    ... did whoever did this steal any of our source code?
  • by presroi ( 657709 ) <neubau@presroi.de> on Wednesday December 03, 2003 @05:50PM (#7622414) Homepage
    http://savannah.gnu.org/statement.html

    On December 1st, 2003, we discovered that the "Savannah" system, which is maintained by the Free Software Foundation and provides CVS and development services to the GNU project and other Free Software projects, was compromised at circa November 2nd, 2003.
  • Tripwire / AIDE (Score:3, Insightful)

    by Asdex ( 554247 ) on Wednesday December 03, 2003 @08:41PM (#7624011)

    From the Gentoo Altert:
    • "However, the compromised system had both an IDS and a file integrity checker installed"

    Gentoo realized that they got hacked after one day.
    GNU Savannah realized that they got hacked after one month.

    It's time to propagate the use of file integrity checkers! They can detect the effects of any new exploit and can't be circumvented (when properly used!).


    AIDE [sourceforge.net]
    Tripwire [sourceforge.net]
  • by reconbot ( 456259 ) * <wizard.roborooter@com> on Wednesday December 03, 2003 @09:03PM (#7624199) Homepage Journal
    But I'm glad that there has been so many attacks against linux and other oss projects.

    Kernel.org, debian.org, gentoo.org Gnu.org All of them had security holes and now those holes are plugged.

    I used to run a few servers. Mostly web-servers, but I had a few for mail and other things. Almost every single one was hacked all in the same 2 month period. I had kept up with updates and I figured I was secure. If I wasn't hacked I would have never known that I wasn't secure and I could have been seriously screwed down the line. It was a much needed eye opener.
  • by boots@work ( 17305 ) on Thursday December 04, 2003 @01:39AM (#7625886)
    An rsync vulnerability has been identified.

    I was going to post it here, but the moronic lameness filter won't let me. So you'll need to look at rsync.samba.org [samba.org].

    The rsync team has received evidence that a vulnerability in rsync was recently used in combination with a Linux kernel vulnerability to compromise the security of a public rsync server. While the forensic evidence we have is incomplete, we have pieced together the most likely way that this attack was conducted and we are releasing this advisory as a result of our investigations to date.[....]

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...