Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Freenode Network Hijacked, Passwords Compromised? 414

tmandry writes "The world's largest FOSS IRC network, FreeNode, was hijacked (for lack of a better term) by someone who somehow got a hold of the privileges of Robert Levin, AKA lilo, the head honcho of FreeNode and its parent organization, PDPC. To make matters worse, the passwords of many users may have been compromised by someone posing as NickServ, the service that most clients are configured to send a password to upon connecting, while they reconnected to the servers that hadn't been killed. Of course, if someone was able to nab lilo's password, every user password may have been ripe for the taking. The details are still unknown, but these events raise scary questions about the actual security of FreeNode and other organizations like it."
This discussion has been archived. No new comments can be posted.

Freenode Network Hijacked, Passwords Compromised?

Comments Filter:
  • Re:Good Riddance (Score:5, Informative)

    by SailorFrag ( 231277 ) on Sunday June 25, 2006 @11:40AM (#15600686) Homepage
    I was going to suggest something along those lines, but if you think about it... if the services database were compromised, even if there's hashing, then everyone's passwords might get out anyway. I don't think anything actually implied that they're stored plaintext.

    I hope not, at least.
  • by ailaG ( 687084 ) on Sunday June 25, 2006 @11:40AM (#15600688) Homepage
    if you can pose as nickserv, some people will send you their password, thinking you're the real nickserv bot. the original identification command is to PM nickserv your password, assuming that nickserv is a nice bot that won't tell anyone. now, if someone poses as our nice little bot..
  • Re:yeah well (Score:5, Informative)

    by A.K.A_Magnet ( 860822 ) on Sunday June 25, 2006 @11:46AM (#15600709) Homepage
    *Don't auto ident during connect
    And if you auto-identify in your perform, do something like : /identify *pass* which is a server-side macro for "PRIVMSG NickServ@<services-fakeserver-hostname> :password".

    The IRC protocol allows to send messages to Nick@server (means "send a message to 'Nick' if and only if he's on 'server'"), so you can do the same with services. Then if the Nickserv nickname is hijacked, it won't matter, because the services "fake server" cannot be hijacked without knowledge of hub configuration (C/N lines) and if ever it happens, IRC admins/opers will notice (that's not something you can't miss).

    So either choose the macro (/identify) or the whole command. Or identify manually :)
  • by epiphani ( 254981 ) <epiphani@@@dal...net> on Sunday June 25, 2006 @11:49AM (#15600716)
    Assuming their nickserv handling on the server side is run the same way Bahamut does theirs...

    *serv nicknames are generally reserved through Qlines. Qlines can be used to restrict all kinds of pattern-matched nicknames, however they still allow opers to use them - this is quite intentional. If the compromised server allowed people to set up opers, it would have been trivial to oper up, remove the real services from the network, and change your nickname to *serv.

    I'm not sure how many networks have picked up on the /nickserv or /msg service@services, but bahamut uses that, and does not accept messages in any other method for services. Bahamut is generally built specifically to handle these types of things.

    If freenode was using Bahamut, I'd be interested in talking to them about this. If a freenode admin sees this, drop me an email.
  • by Draelen ( 920902 ) on Sunday June 25, 2006 @11:49AM (#15600721)
    What you refer to is called a Q:Line, which prevents non opers or non U:Lined services from using specified nicknames. If the attacker had lilo's oper pass, then the attacker could easilly then change their nick to "NickServ", thus facilitating the compromise.
  • Re:What questions? (Score:4, Informative)

    by LoadWB ( 592248 ) * on Sunday June 25, 2006 @11:57AM (#15600755) Journal
    Pretty much why I quit IRC a number of years back. Not to be mistaken, IRC has many valuable functions and features -- beyond downloading warez and moviez -- but not for casual chat. If you know the specific channel to go to, you are most likely fine. But for the casual chatter, browse around open channels and you will invariably end up with mass invites, notices, spam, DOS, MSG/CTCP/DCC floods, and my favorite, the mIRC scripts sent via DCC.

    I only used mIRC briefly in my IRC career. It had little to no built-in protection at the time and I went back to AmIRC (Amiga.) Using WildIRC and Kuang11, AmIRC could not be beat. Later scripts for mIRC became much more solid and advanced, and I am sure the program is much better today?

    Brings back some memories, actually. Back around 1997 we used to use a simple ICMP ECHO (ping) packet with a payload of "+++ATH0". Anyone with a modem which did not follow the Hayes specification for the escape sequence (+++ followed by two seconds of "silence") would immediately hang up as the TCP/IP stack sent an ICMP ECHO RESPONSE with the same payload. Was great fun for two or three times.
  • by dmd ( 404 ) <dmd@ 3 e . org> on Sunday June 25, 2006 @12:03PM (#15600773) Homepage
    Nobody should be using the same password on ANY two sites. You have no control over what the remote side is doing with your password.

    Use something like http://www.hashapass.com/ [hashapass.com] to generate your passwords instead, and you only have to remember one thing, but your password is different on every site.
  • by EnsilZah ( 575600 ) <EnsilZah.Gmail@com> on Sunday June 25, 2006 @12:23PM (#15600864)
    This really should have been moded informative, people need to work on their sense of meta-humour. =\
  • by FooAtWFU ( 699187 ) on Sunday June 25, 2006 @12:33PM (#15600897) Homepage
    It is, and it can't.

    Well, if you'd read the fine summary (maybe if you'd UNDERSTOOD the fine summary, I guess you read it) you'd know that it does not store the passwords in the clear but that someone logged on to impersonate the authentication service, which recieves passwords sent in the clear. But there's really not too much you can do about that, even when you have a secure connection. It's like someone who replaces the CGI script on your log-in page to capture everyone's <input type="password"> submissions. Which are also recieved in the clear, whether or not they are sent via SSL.

    Yeah, we have things like public key authentication. No, there's no real good way to use them on IRC. It is an old protocol. Sorry.

  • Re:Good Riddance (Score:2, Informative)

    by Sinbios ( 852437 ) on Sunday June 25, 2006 @12:39PM (#15600923) Homepage
    Passwords on IRC are sent via plain messsages to NickServ, which acts just like any other client. I assume regularly NickServ does not log these messages, but if the server is hijacked these messages are probably easily viewable.
  • by FooAtWFU ( 699187 ) on Sunday June 25, 2006 @12:42PM (#15600940) Homepage
    Freenode uses Hyperion. The preferred authentication technique at the moment, FYI, is to send your nick's password in the IRC server password field when you connected; this will serve to authenticate you to that nick, bypassing Nickserv or /nickserv or /quote nickserv or /msg nickserv@services. - and is probably the most secure option available, and one of the easiest to set up.
  • Re:Good Riddance (Score:3, Informative)

    by Doc Ruby ( 173196 ) on Sunday June 25, 2006 @01:39PM (#15601162) Homepage Journal
    Which is why good hash functions generate different hashes for every transaction from the same plaintext. Like including a timestamp.

    Hashes are proven deterrents to attacks that raise the cost of attacks much higher than their returns. Of course they have to be used correctly. That's how security works: you can't protect your house by taping a lock to the welcome mat.
  • by Anonymous Coward on Sunday June 25, 2006 @02:08PM (#15601276)
    Certainly not.  But I would recommend for extra security, using:
    /quote nickserv identify foo

    ...instead, if your IRC server supports it.  It reduces the risk of an imposter snagging your password if Services should crash.
  • by mr_stinky_britches ( 926212 ) on Sunday June 25, 2006 @02:16PM (#15601299) Homepage Journal
    EFnet now has chanfix...the days of lawlessness and channel raiding on EFnet are unfortunately things of the past :(
  • by AEton ( 654737 ) on Sunday June 25, 2006 @03:02PM (#15601479)
    I'm sure as a snarky comment poster on slashdot you are perfectly capable of auditing code for 0-day vulnerabilities and then writing exploits for said vulnerabilities. Then you'd be perfectly capable of using them to root a box on the same switch as a freenode server and using ARP spoofing to play man-in-the-middle to all incoming connections.

    The first step is fine. The second step might even be okay.

    The third step renders you essentially unemployable, should your employer find out.
  • by Anonymous Coward on Sunday June 25, 2006 @03:21PM (#15601554)

    TY. (That means 'thank you.')

    Don't be so fucking condescending.

    (Condescending is when you talk down to somebody.)

  • Re:It goes to lilo (Score:2, Informative)

    by ameyer17 ( 935373 ) on Sunday June 25, 2006 @03:23PM (#15601562) Homepage
    IANAL, but if that's true, it's fraud.
  • by RotJ ( 771744 ) on Sunday June 25, 2006 @03:27PM (#15601574) Journal
    [01:26] -lilo- [Global Notice] Hi all. We just experienced a brief outage between our US and EU hubs....we're investigating. Apologies for the difficulties, and thank you for your patience.
    -
    [01:28] -lilo- [Global Notice] We're told that the service interruption affected EFNet as well....in the absence of further problems, we'll pass you any information we receive on wallops (/mode yournick +w)....thanks!
    -
    [23:44] -ratbert- [Global notice] I am a fat asshole, who loves abuse, die
    -
    [23:44] -ratbert- DCC SEND YOUAREALLJUDENLOL
    -
    [01:07] -lilo- [Global Notice] Hi all. As you may be aware, freenode has experienced a crack attack and we're working on tracking down the details. At this point, we cannot guarantee that more problems will not occur.
  • by Random832 ( 694525 ) on Sunday June 25, 2006 @06:39PM (#15602266)
    except a lot more people could be tapping the wire than just the government.
  • by Breakfast Pants ( 323698 ) on Sunday June 25, 2006 @08:17PM (#15602663) Journal
    I hope you aren't in a dorm room.
  • by Breakfast Pants ( 323698 ) on Sunday June 25, 2006 @08:30PM (#15602718) Journal
    Internally the server just sends a message to nickserv when you do this, so it wouldn't have helped.
  • Re:My thoughts.. (Score:5, Informative)

    by nenolod ( 546272 ) <nenolod@g m a i l .com> on Sunday June 25, 2006 @10:09PM (#15603054) Homepage
    Hi! I used to be freenode staff, and I figured I would comment on this.

    You obviously have no idea how freenode's infrastructure is managed -- the infrastucture isn't a land of ZOMG I BOUGHT SHELLZ FROM SHELLFX.NET garbage. Most of these servers exist solely to host freenode, do not use ssh passwords (instead private keys are used), and do not use the same passwords as lilo's o:line password.

    The fact is that they rooted servers close to freenode servers (i.e., on the same switch); then used ettercap to sniff o:line passwords. This was exacerbated by the fact that o:lines are (NOT masked *@*, but masked ?=levin@*), so basically all that had to be done was use the username levin, and boom you're opered up.

    That is what the issue is, the o:lines are insecure masked. Nothing more.

    HOWEVER, since they were sniffing, it is possible that they may have lifted services passwords as well -- people should probably change them. Then again, how do you know that they still aren't sniffing. Quite simply, nobody except the people behind this know.

    Also, the group freenode is dealing with is known as Bantown, which has a reputation of causing whatever hell they wish wherever they feel like doing so. So no, none of what you said is truly relevant, as this group is a tad more unpleasant than the GNAA is. Infact the GNAA is a bunch of nice guys in comparison to Bantown.
  • No, it's "hackers" in the sense of the world that the vast majority of the world's population refers to it.

    Mmm hmm. Fusion bombs aren't nuclear because most people are too stupid to know the difference. Irony isn't cruel happenstance because most people are too stupid to know the difference. Translucent doesn't mean partially transparent just because most people are too stupid to know the difference.

    This word doesn't change because of popular dumb either. Descriptivists are apologists who don't understand the difference between a mistake and progress. Don't fall for their trap; common usage just doesn't shift that fast. Believe it or not, reporters can be mistaken. Note for example that the word "alleged" has a critical and specific meaning in law, that someone has been convicted of a crime. Now, pay attention to your local news, who will call someone who is held under suspicion or awaiting trial "alleged."

    If a whole bunch of people start calling your wife a boat, is that suddenly a new legitimate usage for the word "boat?"
  • by Anonymous Coward on Monday June 26, 2006 @05:16AM (#15604147)
    Here you go:
    http://passwordmaker.org/ [passwordmaker.org]

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...