Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Open Source Software

SourceForge Down After Attack [Updated] 143

Animats writes "SourceForge, a hosting site for many open source projects, is down today. Management claims they were attacked: 'We detected a direct targeted attack that resulted in an exploit of several SourceForge.net servers, and have proactively shut down a handful of developer centric services to safeguard data and protect the majority of our services.' Currently, CVS and SVN access to source code, even for reading, is unavailable, and there is no announced restoration time." (SourceForge and Slashdot are both part of Geeknet, Inc.) Update: 01/27 22:17 GMT by T : Mark Ramm of SourceForge contributes an update and some clarification: the site is up, and SVN is available, though CVS isn't. There's also a follow-up post on the site's blog.
This discussion has been archived. No new comments can be posted.

SourceForge Down After Attack [Updated]

Comments Filter:
  • Why (Score:3, Interesting)

    by Anrego ( 830717 ) * on Thursday January 27, 2011 @05:32PM (#35024602)

    What the hell did sourceforge ever do to anyone?

    I guess this could have been an attempt to spread some malware or something (by poisoning popular projects)?

    Off topic: how many people actually download directly from sourceforge any more. I have to imagine the majority of users (even before the mass ubuntu influx) get their stuff second hand through their favorite distro’s repository these days. I know I haven’t been there with any regularity since my `ol slackware days *tugs pants up past waist*.

  • Aw, crap. (Score:4, Interesting)

    by Nefarious Wheel ( 628136 ) on Thursday January 27, 2011 @05:34PM (#35024630) Journal
    This has to be a moneyed interest.

    Whoever you are, out there, you're not a clever geek, you're just an asshole.

  • Re:Qui bono? (Score:4, Interesting)

    by Securityemo ( 1407943 ) on Thursday January 27, 2011 @05:36PM (#35024672) Journal
    Because it's a high-profile site, and presumably staffed by people who know what they are doing? Eg., for the kicks?
  • by quanticle ( 843097 ) on Thursday January 27, 2011 @05:37PM (#35024702) Homepage

    Well, if you wanted to sneak malicious code into an open-source project, cracking its repository might be a good way to do so.

  • by Securityemo ( 1407943 ) on Thursday January 27, 2011 @05:51PM (#35024914) Journal
    Since they took down SFTP access, presumably someone got their hands on passwords/the password database.
  • possible explanation (Score:5, Interesting)

    by Anonymous Coward on Thursday January 27, 2011 @05:52PM (#35024938)

    http://www.exploit-db.com/papers/15823/

    You would think that the authors of Ettercap, one of the most popular
    whitehat pentesting tools, would know the basics of security.
    Apparently they don't, or they just don't give a shit about what
    happens to their users.

    So, why is their website so insecure? Ettercap's message board is
    hosted at Sourceforge, so they share a server with thousands of other
    customers. Every single customer is able to execute commands and
    access the other project directories. Pretty stupid, eh? You only need
    to find one hole in one hosted site and you can access ALL the project
    databases. Of course that isn't ALoR's fault, it's Sourceforge's
    fault. Regardless, people who care about security and data integrity
    wouldn't use such a shitty provider, would they?

  • by Anonymous Coward on Thursday January 27, 2011 @06:06PM (#35025124)

    This was posted on Full Disclosure 4 days ago. http://seclists.org/fulldisclosure/2011/Jan/424 [seclists.org]

    Seems they left the backdoor open even after being notified.

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...