FSF FTP Site Cracked, Looking for MD5 Sums 752
landley writes "The Free Software Foundation's FTP site at ftp.gnu.org has been "compromised", and they don't seem to have full backups. They've yanked a bunch of recent packages (and their whole alpha.gnu.org ftp site), and when I asked about it they responded 'Our FTP server was compromised, yes. We are beginning to find good MD5sums for files which have not yet been restored, and they will be available again Real Soon Now. If you can provide MD5sums for any of the files listed in MISSING-FILES, it would be very much appreciated.' " Update the FSF has
a statement
on the FTP site explaining the matter.
Have a floppy? (Score:2, Insightful)
Oh crap (Score:2, Insightful)
GNU is the definitive location of loads of packages. Virtually everyone who uses Linux is potentially affected. It's as if Windows Update were cracked. I don't see anything on the main GNU page yet though...
Wait? I thought Linux was Secure?? (Score:2, Insightful)
Just a healthy reminder that nothing is 100% secure, so no point in pointing fingers (on MS OR linux).
Re:Correct MD5s (Score:4, Insightful)
Surely, there aren't that many dishonest people, and if there were, then it would be hard for them all to get together and come up with the same MD5.
Of course, if this was a MS site that was (Score:2, Insightful)
Where's the snide comments from the /. editors? (Score:1, Insightful)
You're Kidding? (Score:5, Insightful)
Unbelievable. And I'm supposed to trust their methods and products with my enterprise?
Re:the $64,000 question: (Score:3, Insightful)
Good God. The fact you can post that comment...no. You're just too much of an unthinking hero-worshipping idiot for me to finish. Yes, it was an inside job or a weak password. Anything except a vulnerability. Yes.
That is awful... (Score:3, Insightful)
Having just read the above, let me add: Let a thousand jokes be posted!
Re:Correct MD5s (Score:5, Insightful)
Re:Wait? I thought Linux was Secure?? (Score:2, Insightful)
Re:the $64,000 question: (Score:3, Insightful)
Which is why syslog should be on another secure computer, and dumped to paper in a locked room for high-security sites.
It won't help the recovery, but helps pinpoint the intrusion
apache? (Score:3, Insightful)
But no, Apache isn't 100% secure. There is no such 100% server, except one unplugged from the net, encased in titanium, and buried beneath the Pacific seabed.
Re:You're Kidding? (Score:5, Insightful)
Why no PGP signature? (Score:4, Insightful)
BTW, here is my contribution:
> md5sum sed-4.0.7.tar.gz
005738e7f97bd77d95b6907156c8202
-molo
Re:Oh crap (Score:2, Insightful)
Actually, Windows Update has been cracked. During Code Red 1, for a period of a couple hours Windows Update was showing "HACKED BY CHINESE WORM".
But I agree, this is just as horrible as that was. Some kind of inquiry as to how this was allowed to happen, and why the hell weren't there backups, and how this can be absolutely prevented in the future, needs to be publicly demonstrated to have happened within the FSF before I will regain the trust I have lost in them. The software the FSF produces is wonderful but their FTP archive is important enough to people of all OSes and natures all around the world that they should have it secured by whatever means necessary, even if that means running OpenBSD or whatever.
-- Super Ugly Ultraman
Re:So apache no invulnerable then... (Score:3, Insightful)
As is the case with most installations of MS Windows, other operating systems and pretty much any user level software, the security of the system is only as strong as the weakest link: usually that's the user (and the sysadmin falls into that group). Bad passwords, bad security policies, and lax attention to security patching affect every system because every system has users.
Why might Free Software Zealots be laughing when MS products are demonstrated to be insecure? Because people have paid MS billions of dollars for that software. MS has billions of dollars in the bank. You'd think a company with those kinds of resources could hire a few security experts-- or even a few thousand-- and have them really work out the bugs. Free Software, on the other hand, is largely produced as charity, costs little or nothing to obtain, and at least when the code is demonstrably insecure, you (the user) have both the means and the right to fix it. Not so with the expensive binaries you get from Redmond.
Oh, thanks for trolling. I assume this response is exactly what you were hoping for.
Re:Correct MD5s (Score:4, Insightful)
Any use of the checksum to ensure that the file has not beeen altered before the transfer is useless. As a person who crack a server will replace the file and it's checksum.
File checksum should always be signed by someone who can be trusted. If that's not the case, they are worthless.
sheesh! Can you fire a volunteer sysadmin? (Score:2, Insightful)
Could someone pass on to them that CDR/RW drives get put on sale at CompUSA for around $20 on a fairly regular basis? If you rebate the CDrs you can practically get them for free. DO A BACKUP ONCE IN A WHILE, SOMEBODY WILL BREAK LOOSE FOR THAT MUCH IN POCKETCHANGE!
Re:SCO (Score:1, Insightful)
Hmm odd...one day they speak of taking sco support out of gcc, the next their ftp server gets comprised, interesting.
There are many bad things one may rightly say about SCO, but to suggest that they have anything to do with the compromise is just plain stupid!
One would think... (Score:4, Insightful)
Sorry, gnu.org team, no icecream tonight.
Re:Wait? I thought Linux was Secure?? (Score:3, Insightful)
However, the next time a virus is released that takes down 90% of Linux installs, and toasts most of the internet, let me know. Until then, your point isn't exactly valid.
Re:the $64,000 question: (Score:5, Insightful)
backups (Score:3, Insightful)
i mean, all the posts here are about how insecure FSF is, or OPensource sucks...or windows sucks more...
what about the bloody principle of backing up your own software? let me guess, stallman and his crew has ONE FTP server, and they never back the bloody thing up? they should all be punished for such foolishness. nobody in a corporation would allow this...what would have happened if the harddrive crashed, or the raid crashed hard on that FTP ser4ver? the same thing!!!
asking the world for MD5 sums...
tsk tsk.
oh, and I use OPen Source just about everywhere, except my workstation (manditory windows). I run a chrooted Wu-FTPD, never had too much trouble either...but, we have a tape backup, just incase...
Putting on my troll hat (Score:1, Insightful)
Oh, come on, trolls. Give it a rest.
Re:Well that's good and all, but (Score:3, Insightful)
They were using wu-ftp? That's a worse security hole magnet than sendmail or bind.
Re:This pisses me off more than it should. (Score:1, Insightful)
This was just a learning experience, like any other. Now the GNU server maintainers will be more cautious and keep backups and up to date software on the servers, etc.
Don't hack GNU, burn a church instead!!
Re:Well that's good and all, but (Score:5, Insightful)
At least they yanked the programs until they could verify that they were correct. That really was the only thing they could do. The lesson to take from this is that with computer security and auditing, nothing less than absolute perfection is necessary. And so long as human beings are doing the admin work, absolute perfection just isn't realistic.
Re:BSD Ports trees should have them (Score:3, Insightful)
They may be verified, but I think in some cases the ports packages will be subtly different than the ones GNU is really looking for.
Re:Wait? I thought Linux was Secure?? (Score:2, Insightful)
Depends on how you define secure. If a major windows site gets broken into like this, you don't hear about it. You only hear about Windows problems when a.) Microsoft decides to release a "security fix", or b.) when large corporations and state governments are brought to their knees.
The real story is (and this groks with your point, by the way), how do you trust someone trying to proselytize you with an alien philosophy of computer use when they still run wu-ftpd and don't do backups?
Re:Full backups (Score:3, Insightful)
They have to recompile the stuff from the developers who hopefully have had better success in maintaining the integrity of their systems and data.
How Long (Score:5, Insightful)
Also nicely demonstrates the pointlessness (and stupidity) of serving out your MD5sums from the same machine.
Re:Worse than that (Score:2, Insightful)
Re:Wait? I thought Linux was Secure?? (Score:5, Insightful)
Though don't bother if it only toasts about 50% of Windows installs and bring down only a significant portion of the internet. That's becoming too common place.
Re:Well that's good and all, but (Score:5, Insightful)
While I agree with the premise of the post, this is sort of thing that would get flamed to hell and back if the thread dealt with a Microsoft security breach (case in point, see yesterday's discussion [slashdot.org] about the RPC worm). According to that thread, being overworked, underpaid, or anything else is not an excuse for having an unpatched machine.
Re:Wait? I thought Linux was Secure?? (Score:2, Insightful)
Re:Wait? I thought Linux was Secure?? (Score:4, Insightful)
Last time I checked, it was wu_ftpd that had the vulnerability, not Linux. It doesn't matter if you were running it on Cygwin, *BSD, HURD, or Linux. Geesh. Stop calling everything OS Linux, because it isn't.
Why Configuration Management Is Important (Score:2, Insightful)
End of sermon.
Re:Correct MD5s (Score:2, Insightful)
I did say "clever" didn't I? The only reason we have any luck catching spammers is that the spam they send is pretty obviously spam: obvious keywords, RFC non-compliant headers, lots of HTML, etc.
No excuse? How about the directional flow of time? (Score:2, Insightful)
being overworked, underpaid, or anything else is not an excuse for having an unpatched machine
RFTA before critisizing their admin(s):
Is the lack of a patch an excuse not to be patched?
Re:the $64,000 question: (Score:4, Insightful)
If a bug in IIS causes a remote exploit then that's a bug in IIS, and that's it. Now, if there's a bug in the Windows TCP/IP stack, networking components, some kernel call, etc, which causes an exploit then that *is* a bug in Windows.
A bug in wu-ftpd doesn't just affect Linux. It will also affect the other supported platforms: BSD/OS 1.1, and 3.1, FreeBSD 2.2.6, SCO OpenServer 5.x, SCO UnixWare 2.1, Solaris 2.4, 2.5.1 and 2.6, Sun Sparc Platforms, Solaris 2.6, Solaris 2.5.1, SunOS 4.1.4
The only real security vulnerabilities in Linux are the ones that affect only the kernel and Linux specific tools. Everything else is just a vulnerability in some other program.
Re:Corrupted Backups (a.k.a. Why request MD5s?) (Score:3, Insightful)
The FSF's admin is just savvy enough to realize what the limits of backups are. They are hoping that other people who may have downloaded these packages before the crack will have what the valid MD5s for them are. On the other hand, this isn't going to be a reliable answer for them either. People who have cracked binaries will report back the cracked sum. They have to look for files for which they get contradictory responses on. This isn't foolproof either thanks to malicious trolls who post false info and potentially cracked files for which no one responds with the correct MD5 to. I wish them good luck, but they are going to be carrying suspect data for a long time.
Read the link off of the Alpha site for more information on what they're doing and why [gnu.org]. (Yes, Virginia, they did have backups.)
Pointless (Score:4, Insightful)
Unless of course, the mirror hasn't been updated since sometime in mid-March.
Easy to point out someone else's mistakes (Score:5, Insightful)
It's very easy to point out other people's "mistakes" like this, but I wonder how many people actually take all these various precautions that they're so quick to accuse others of not implementing?
The fools! They forgot to install a firewall!
The fools! They didn't purge all the old user accounts!
The fools! They didn't install the latest security patch! On all the boxes in the office!
The fools! They didn't require 10 character passwords, to be changed every 15 days!
The fools! They didn't update their virus definition files! Within the last 24 hours!
The fools! They didn't make triple-redundant off site backups!
The fools! They didn't have a plan C!
The fools! They don't know where their towel is!
Now granted, if you're being paid the big bucks to think about nothing but information security all day then all of these things should probably cross your mind... but I would be willing to bet that most people who are so quick and proud to show off their shiny, impenetrable suit of dragon scales have a soft vulnerable spot on their bellies.
Re:Wait? I thought Linux was Secure?? (Score:2, Insightful)
AFAIK, linux generally doesn't leave unsecure ports open by default. what happens if someone reinstalls XP at some point in the future - could MSBlast come back when all the fuss has died down?
I don't read a single second of usenet security groups, let alone 10 hours a week. SuSE YOU takes care of all that for me automatically.
I let YOU do updates automatically because I trust it, whereas I turn off Windows automatic updating because I don't. since when is Media Player 9 and IE6 a "critical" update? plus windows updates often require a restart, and many need to be applied one at a time.
once I did install IE6 to see what it was like and immediately there were another ~10 critical security updates that I required, so that was hardly a step forward for security imo.
Re:Have a floppy? (Score:3, Insightful)
Since the server was hacked sometime in March, even the backups have the possibility of being compromised. I doubt they keep 5+ months of nightly or even weekly backups sitting around.
Re:the $64,000 question: (Score:4, Insightful)
A mirror is a random (whenever the mirror was made) point in time back up. There is no assurance that at any given point in time in the future that a mirror is available in a particular point in time in the past. As a result, the answer to the question "do we have a backup" resolves to "maybe". Generally this sort of answer makes people squirm.
In this particular situation the problem is exacerbate by the fact that every release from march until NOW needs to reaquired from it's source becuase after march 2003 - the source repository and it's mirrors can no longer be considered safe.
Indeed, a very difficult situation to be in.
In order to answer Yes to the point in time question one must invest considerable cash in hardware and software to provide such backups.
Re:You're Kidding? (Score:3, Insightful)
What I do on my server, and what you do on your server is our own problem, but you would think the primary FTP site for all FSF would have a little better security. Yea, its like how mechanics don't take great care of their own cars, but this really is a black eye, and potential marketing tool, mainly because the server has been 0wned for MONTHS now. Doesn't shake my faith (been with linux 4 years now), but it MIGHT shake someone considering migrating.
"First Linux steals Unix property from SCO, and now their servers were hacked and it took them months to figure it out."
I'm not trolling, I'm wincing... Right or wrong, some people WILL see it this way.
Go easy on 'em... (Score:5, Insightful)
Rather than boast about all of the work they do, they quietly work behind the scenes just so you can play Monday morning quarterback. They have one fulltime systems administrator who is *INCREDIBLY* overworked. They are doing everything they can to keep the boat together. Last year they were over $315,000 in the red. Thanks to the FSF associate program and some skillful fundraising they're back in the black.
Want to help? Go get your FSF associate membership [fsf.org]. It's not that expensive and it goes a long way towards helping to protect your freedoms.
Incidentally, this is also old news. They had MD5 sums verified, and the servers were patched up and back online almost two full weeks ago. None of the software was trojaned.
Who am I? Just another hacker who bothered to pay for an associate membership (#1142)...
Re:RTFA: There *are* backups, and they *did* patch (Score:3, Insightful)
What's really sad about this... (Score:3, Insightful)
The FSF don't say (and probably shouldn't say) whether they know who did it. I hope they do, because if they don't the mistrust which will be engendered will cause a lot of unhappiness, and will distract maintainers from looking after the packages we all use.
If the FSF don't know, I hope the culprit has the guts to own up, and own up quickly.
Re:This pisses me off more than it should. (Score:3, Insightful)
That's by no means a valid assumption. Consider a remote non-root exploit coupled with a local root exploit. Not that uncommon. Figure that at this point, most network services don't run as root, and you can fairly easily envision a situation in which such a series of compromises might have lead to this situation.
noah
Re:This pisses me off more than it should. (Score:3, Insightful)
this is way worse than when someone writes a worm that intentionally targets home windows+broadband users to destroy the functionality of the internet. see, when someone is doing that, they're making a political/religious/security statement that windows sux0rs.
on the other hand, when someone owns the primary distribution server for the worlds most important, relevant free software and the maintainers really have no clue how badly they've been stung over a period of 6 months, well, nobody questions the bullshit about "many eyeballs", and "i just cant trust microsoft/windows update", etc.
instead, someone has committed a MORAL CRIME that has you feeling sick about humanity.
its time for a readjustment folks. more slashdotter has told me that microsoft is "more evil" than saddam hussein. another suggests that microsoft should be held accountable for when MS machines get hacked, or when non-MS machines running MS software get hacked. Another has said that any system that depends on patches for security fixes is garbage, and linux should be used instead.
Wake up and smell reality.
the people that write and use exploits target what is most likely to give them their kicks, whatever that may be. nothing is secure enough against a suitably motivated attacker. the rablidly pro-linux anti-MS community has been making a lot of unsubstantiated statements for a long time, and the fallacies contained therin are starting to come back to haunt them.
Re:You're Kidding? (Score:3, Insightful)
Heh, in Canada... (Score:1, Insightful)
The sad part is that you think a world where such things are possible is *undesirable.*
I would *love* to trust my fellow man, personally