Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Slashdot Deals: Deal of the Day - 6 month subscription of Pandora One at 46% off. ×

Novell OpenSUSE Server Hacked 329

abelikoff writes "Both LinuxWorld Australia and SuSE Linux Forums report that OpenSUSE website got hacked last night." This story was submitted quite a number of times.
This discussion has been archived. No new comments can be posted.

Novell OpenSUSE Server Hacked

Comments Filter:
  • ssh scan (Score:5, Informative)

    by perp (114928) on Sunday October 02, 2005 @11:30AM (#13698765)
    This server probably had a weak root password and was hacked by one of the several automated ssh bruteforcers out there 34 []

    I see these attacks all the time on all Internet facing servers.

  • by sjvn (11568) <sjvn@vna1. c o m> on Sunday October 02, 2005 @11:31AM (#13698768) Homepage
    The LinuxWorld Australia story is actually about an earlier break-in of a Novell system that was being used for World of Warcraft related stuff, not the OpenSUSE site at all.

  • by blanks (108019) on Sunday October 02, 2005 @11:39AM (#13698813) Homepage Journal
    The open SuSE website wasnt hacked, it was a damn gamming machine they had on their network.

    From TFA:

    "The employees that set it up apparently had no idea of security," Brandon said. "But what is really surprising is that Novell would allow employees to set up game servers on their corporate network and then allow the public to access it."

    "There was no major breach of security here," Barney said. "Needless to say, we are taking the appropriate steps" to address the situation.
  • Re:Neat (Score:1, Informative)

    by Anonymous Coward on Sunday October 02, 2005 @11:48AM (#13698865)
    rc28@linux:~> ps -eaf | grep ncsd
    rc28 27377 7202 0 12:44 pts/0 00:00:00 grep ncsd

    wtf are you talking about?

    From: yourfriendly neighborhood Suse 9.3 user
  • They have a website (Score:3, Informative)

    by gcnaddict (841664) on Sunday October 02, 2005 @11:52AM (#13698889)
    the hacker team has a website [] to add to that, its likely being hosted in iran so no one can do jack shit
  • Re:Don't blame LINUX (Score:3, Informative)

    by grub (11606) <> on Sunday October 02, 2005 @11:53AM (#13698892) Homepage Journal
    Which part actually got hacked, the OS or the webserver itself??

    Only those Iranians and the SUSE people know :) Regardless, running something like OpenBSD with its hardened & chroot'd apache could mitigate a lot of the damage. ie.: make most files read only to the httpd process, etc etc.
  • Blog of the hacker (Score:2, Informative)

    by Vario (120611) on Sunday October 02, 2005 @11:58AM (#13698916)
    The head of the defacement crew has a blog that is kind of interesting to look at: []

    He is a movie fan and was just accepted to a university.

    Some bits of information can be found here: 90/ []

    Besides the OpenSuSE website they also hacked into and

    Too bad that the Iranian hackers used OpenSuSE for their political stuff. It seems a bit misplaced, what does a linux distribution has to do with the question whether Iran should have nuclear stuff or not?

  • Re:ssh scan (Score:2, Informative)

    by Nikademus (631739) * <renaud@a[ ] ['lla' in gap]> on Sunday October 02, 2005 @12:11PM (#13698984) Homepage
    That means, they were not smart enough to:
    1: change default ssh port
    2: disallow direct root logins via ssh

    Those 2 simple principles prevent many things.
  • by TehBeer (860440) on Sunday October 02, 2005 @12:28PM (#13699061)
    let me guess, iptables not enabled, no firewall service up, no bfd, SSH was up unfiltered and the root pass was a 3 letter word like god, to quote the movie "hackers" with angelina jolie. Hack the gibson. Hack the planet. Go Iran. Just kidding.

    Alot of people are reluctant to use a firewall, even though you can easily do it with SuSE and YaST2.

    I have the pay version of SuSE9.3 Pro, which is well worth the $99 price tag.
    I mostly run fedora core boxes though, and this is a really good alternative to other iptables interfaces. [] []

    Get yourself those, make sure non of your dir's are 777, have strong 20+ char long passwords, don't RPM fetch from shady repositories, and you're on your way!
  • by houghi (78078) on Sunday October 02, 2005 @12:29PM (#13699066)
    I'm running SuSe 9.3, and this morning, I let the automated update program do it's thing. Did I download and install any breached files?

    No. It was just the WiKi server that went down.
  • by gregorio (520049) on Sunday October 02, 2005 @01:13PM (#13699297)
    The open SuSE website wasnt hacked, it was a damn gamming machine they had on their network.

    From TFA:
    Click the "hacked" link in the submitter's text.
  • by Anonymous Coward on Sunday October 02, 2005 @01:16PM (#13699315)
    sshd should ofcourse be all:deny except a list of IP's you trust, and not allow:all except a list of IP's you don't trust.

    of course. btw, care to share whatever wonderful method you have for keeping the same trusted (static) IP for a laptop no matter what location it's plugged into the net from? And it goes without saying that no real men would ever use an ISP that does DHCP or, God forbid, NAT.

    methinks you should get out into the world more often.

    P.S. Here's a free hint: if you do need to block automated scans (and are too lazy to implement some active blocking) yet still have to allow for flexible use, a far better solution is to move ssh to a different port.
  • by mark_lybarger (199098) on Sunday October 02, 2005 @01:41PM (#13699440)
    might wanna work on your syntax a bit before posting suggestions like machine responds with: PermitRootLogin ermitRootLogin no /etc/ssh/sshd_config now with something like: echo "PermitRootLogin no" >> /etc/ssh/sshd_config maybe you'll get the job done. but then again, maybe not.
  • Re:ssh scan (Score:5, Informative)

    by jaclu (66513) on Sunday October 02, 2005 @02:16PM (#13699613)
    I have a hard time to see the gain in security by disalowing root but allowing users to login and then sudo.

    In the case of three admins, you would end up with three accounts that could be exploited, rather increasing if anything the risk of direct ssh exploits.

    Once the bad guy is in, he has all the local exploit possibilities to gain root, so your already in trouble if they get in.

    So as long as you do ssh with passwords, disalowing root-login dosent really buy you any security, but it hassels the admins each and every day.

    On the other hand, prefered method would be to login with keys and disallow passwords completely whenever possible.
  • Re:ssh scan (Score:5, Informative)

    by Gogo0 (877020) on Sunday October 02, 2005 @03:46PM (#13700018)
    Part of the security comes from non-root logins being unknown.

    One could try to use a non-root user to bruteforce their way into my system, but they'll either get one (probably created by an application) with /dev/null as a shell or they will be trying usernames that dont exist.
  • Re:ssh scan (Score:5, Informative)

    by despisethesun (880261) on Sunday October 02, 2005 @05:16PM (#13700421)
    I have a hard time to see the gain in security by disalowing root but allowing users to login and then sudo.

    You must not have much experience with sudo. One of the benefits of it is that it allows you to give root permission to people for specific tasks that they would need that access level for. While there are certainly a lot of people who set their sudoers file to "allow all" for everyone, if sudo is properly implemented no one should be able to do anything they don't NEED to do as root. Sudo also has the benefit of keeping track of what users used it to do what tasks, making it easier to trace the path an attack came from.

    Gogo0 also mentioned an added benefit to this scheme so I'm not going to repeat it here.
  • by starfishsystems (834319) on Sunday October 02, 2005 @05:19PM (#13700435) Homepage
    Isn't this [poor administration] the same flaw Windows has?

    It's a reasonable question to ask.

    Yes, fundamentally it's true that configuration management has a significant effect on security. To be precise, this is not a flaw, but a characteristic. A site which is in full control of system configuration will have formal security advantages over one which isn't, and this is universally true regardless of platform.

    However, the story is told from a much different perspective when it comes to evaluating the security of a given platform. Configuration remains a major factor in security, but it has to be weighed in light of platform capability. So, for example, a very simple network appliance with a very small configuration space has the prospect of being very secure. An ideal appliance cannot be configured insecurely. In practice, that may or not be the case, depending as always on design tradeoffs and correctness of implementation.

    Apart from pure appliances, all computing platforms must, for reasons of generality, offer configuration possibilities that put some security tradeoffs in the hands of site administrators. Such is the case for both Linux and Windows, so indeed poor administration can always result in poor security on a sufficiently general platform.

    The practical focus, therefore, has turned to how securely these platforms are configured by default. Interestingly, even though Windows is marketed for nonexpert use, it has a long tradition of being configured insecure by default, exactly the opposite of what would be appropriate for a nonexpert market. It also, in my opinion, embodies a lot of fundamentally insecure design tradeoffs, neglecting principles such as modularity, containment, and least privilege, for example. These are extremely deep design problems, not easily fixed.

    Linux and Unix, although designed by developers for developers, and therefore intended for expert use, have a record of delivering much better security by default. I can think of lots of particular exceptions, but they have tended to be minor design tradeoffs that could be, and were, easily corrected. Security incident statistics seem to reinforce these observations very strongly.

    In my line of work, I get to see what goes on behind the scenes at a lot of sites. It's not often that I come upon a site which is not suffering to some significant degree from a chronic neglect of configuration management. All discussion of platform characteristics aside, this is a real problem on the ground for security.

    The issue, in terms of value for effort, then becomes to identify which of these sites is (a) at most immediate risk, and (b) has the best potential of improvement. In the former case, I find that the answer is Windows, and in the latter, it's Linux.

  • Re:ssh scan (Score:3, Informative)

    by drsmithy (35869) <> on Monday October 03, 2005 @05:35AM (#13702751)
    I have a hard time to see the gain in security by disalowing root but allowing users to login and then sudo.

    The two biggies are greater control over what can and can't be executed with root privileges and an audit trail.

"Love your country but never trust its government." -- from a hand-painted road sign in central Pennsylvania