Intrusion Cleanup Forces Delay For GNOME 2.6 170
An anonymous reader writes "Looks like the GNOME site (both web and FTP) is back up and running again (from a replacement system). The restoration work is still going on, and dynamic content does not work yet. Bugzilla should be up by tomorrow (it is already in testing mode). More details are available in this announcement. Kudos to the GNOME sysadmin team for such a rapid recovery." However, blurzero writes "GNOME 2.6 was scheduled to be released sometime today, however after evidence of possible intrusion on the web server, the release has been delayed by one week, until March 31st." Update: 03/24 14:08 GMT by T : An anonymous reader points to this story on the delay at ZD Net Australia.
Must've been a real bugger (Score:4, Interesting)
Re:Must've been a real bugger (Score:2, Insightful)
I am personally disappointed in having to wait another week, however I completely respect the Gnome team on their tireless efforts. :)
I definatly agree with the idea of rolling back to a backed up copy of their site, but perhaps they do not know how long someone was able to access their systems?
Gnome team, take all the time you need. :)
Re:Must've been a real bugger (Score:3, Interesting)
TripeWire never works.
I've seen TW failing and being exploited in several installations.
Since the release of wirecutter TripWire has become fucking useless.
Re:Must've been a real bugger (Score:1, Redundant)
Intrustion cleanup is a real bastard to carry out with any degree of success.
Reinstallation is the only tried and true method. Cleaning up to the point where you're satisfied will usually take a lot longer and will leave nagging doubt.
Re:Must've been a real bugger (Score:3, Insightful)
Re:Must've been a real bugger (Score:2)
Re:Must've been a real bugger (Score:3, Insightful)
Re:Must've been a real bugger (Score:5, Insightful)
Either way, you only have to check the backup server data itself against (externally backed-up) MD5 checksums, and ask developers to re-commit any changes made during the suspect time.
Now try and do that to a mail server, and the fecal matter hits the air-handler. But, with data that is relatively static by comparison, it takes work, but isn't too much of a trial.
$0.98 in change, please :)
Re:Must've been a real bugger (Score:1, Insightful)
The caveat with that scenario is that you have to a) know exactly how the break-in occured in order to b) know that you can fix the system from the pre-break in state to remove the vulnrability before bringing the system back online.
Just re-imaging the server and putting it back online will result in the server being comprimised again.
Mod parent up, plz... (Score:2)
You are absolutely right that the admin has to apply any missing patches and modifications to the system that may not have been in place on the compromised server. My thanks for bringing that up
(although, in some cases, no patch will save you... esp. if it was an inside job, or someone got hold of the pa
Re:Mod parent up, plz... (Score:1)
but that's the bitch about security - the paranoia never stops digging deeper
-----
I started out college in '93 as a comp. eng. major. I switched to chemistry because I wanted to keep computers as a hobby and not pollute them with the need to make money. While I sadly watched the Amiga die and the world move to Microsoft I accepted it as a result of giving up computers as an academic pursuit. I never learned C, I never built any *nix/*bsd OS for my home PC, I wistfully used NeXT in the school labs
Re:Must've been a real bugger (Score:3, Insightful)
What if the OS has a vulnribility and the attacker can get back in without issues?
a backup from a time known before the break-in
What if the attacker had installed the back door months before hand? You may not have a valid backup.
Re:Must've been a real bugger (Score:2)
Re:Must've been a real bugger (Score:1)
Surely, much easier with a mail server, as there would be no real data on there.. All the mail is transitional, and besides even if it wasn't, you can easily restore mail queues and users pop3 boxes from a compromised server - it's the system files that matter, and surely a running mailserver has hardly any of those recently updated
Re:Must've been a real bugger (Score:1)
Re:Must've been a real bugger (Score:3, Informative)
Basically, what you generally do is to rebuild from scratch, then carefully check and restore your repository.
How well would TripWire have worked in this kind of situation? Or is that ineffective against an all-out rooting?
This is why the authors of the host-based IDS recommend t
Re:Must've been a real bugger (Score:2)
widget.gnome.org (the machine that was cracked) has been reinstalled. That's part of the reason why things aren't all up again yet.
Re:Must've been a real bugger (Score:1)
Compare to Savannah breakin (Score:2)
Dammit... (Score:3, Funny)
Boy, that was a close call (Score:5, Funny)
"GNOME 2.6 was scheduled to be released sometime today, however after evidence of possible intrusion on the web server, the release has been delayed by one week, until March 31st."
That could have been disasterous had they been forced to delay until April 1. Imagine all the jokes that would have ensued.
Re:Boy, that was a close call (Score:1)
Re:Boy, that was a close call (Score:1)
note to myself: when you preview... read your post carefully.
thanks
Awwww man! (Score:4, Informative)
Maybe the KDE team did this to slow Gnome down...
By the way, I've tried CVS metacity with FD.O's Xserver..... funky stuff. Translucency when you move windows! Although it chews a fair bit of CPU (when moving the window itself, that is, as just holding the window still doesn't chew CPU), it should be fixed when we finally get HW acceleration. I was able to get MPlayer to play a video in the background, hover a window over it and watch it through it. ub3r cool stuff.
Re:Awwww man! (Score:2, Interesting)
Re:Awwww man! (Score:2)
Re:Awwww man! (Score:1)
Well, there is one difference I appreciate... (Score:5, Insightful)
If only MSFT (and more importantly, proprietary software companies that aren't so much in the spotlight) were as forthcoming about break-ins.
Don't look at the source! (Score:1, Funny)
nevermind.
Re:Well, there is one difference I appreciate... (Score:5, Interesting)
Well kiddo, it's not just MSFT truth be known (hence my mention of "more importantly, other proprietary companies..." )
Most proprietary companies are too worried about "customer confidence" to actually be honest with their customers. Back when a group of russians had 3 months' unlimited access to Windows' source code, it took outright proof in public before MSFT would admit to such a thing. ...and that's just MSFT; I wonder how many times Adobe's servers have been compromised? It would be nice to know that P-shop and Acrobat (or worse, the free reader?) wasn't quietly trojaned-up and sleeping on my 'dows boxen.
Now, what about the break-ins we don't know about? How were they handled? How can a proprietary software company, let alone its customers, be sure that there aren't any nasty suprises hidden in their products?
It's damned refreshing to be a customer who is treated like an adult, and not lied to, or kept in the dark about the products I use.
Does this answer your question?
Re:Well, there is one difference I appreciate... (Score:2)
http://news.bbc.co.uk/1/hi/business/998449.stm
I'd imagine that it is possible that other people have gotten in as well. To my knowledge, this is the only one that was made public.
Re:Well, there is one difference I appreciate... (Score:2)
err... didn't SCO dabble in open source, if my memory serves me correct? :-P
Re:Well, there is one difference I appreciate... (Score:2)
Re:Well, there is one difference I appreciate... (Score:3, Insightful)
How does a public disclosure ensure the binaries are secure?
How can a proprietary software company, let alone its customers, be sure that there aren't any nasty suprises hidden in their products?
How? Probably the same way everyone else does it. The OS model does not have a monopoly on practices used to ensure code integrity.
Re:Well, there is one difference I appreciate... (Score:1)
However, if they just took down possibly-modified binaries without an explanation, people would ask questions and require answers they dont' want to give.
Therefore, currently they leave up the possibly infected binaries so that they dont' have to disclose their servers were compromised.
Re:Well, there is one difference I appreciate... (Score:1, Insightful)
I'm guessing Gnome runs some type of Linux/Apache server combo... if they were running Windows IIS, folks would be talking about what a piece of garbage IIS is (regardless of if the security breach was a bug or an IT/config issue)... and Microsoft would be bashed on the 7:00 news for yet another "virus" (you need to dumb it down for the national news).
Re:Well, there is one difference I appreciate... (Score:2)
I suppose (Score:3, Interesting)
Ack. Insightful? (Score:3, Insightful)
Something bad happens to someone we don't like. Haw Haw.
Why do people make such a big fucking deal out of double standards? Should I feel equally angry toward someone who kills a stranger as I would if they'd killed a relative? No.
Re:Ack. Insightful? (Score:3, Insightful)
If so, then even if you don't KNOW or LIKE the victim, you should still support punishment of the criminal. Otherwise, you're encouraging elitism. Or do you want to live in a world where crimes against the unpopular are cheered and go unpunished?
I lived in a similar world called "Middle School," and I wouldn't want to go back.
Re:Ack. Insightful? (Score:1)
Or do you want to live in a world where crimes against the unpopular are cheered and go unpunished?
-----
News Flash! Today's top headlines!
American Society Verified to Function as a Communist Pyramid Scheme
-----
Using complex statistical models, mathematicians at MIT, RIT, RHIT, and Harvey Mudd have confirmed that the flow of money and power in the United States seems to follow the exact same patterns as a systems (commonly known as "pyramid schemes") in former communist USSR.
"We're seeing a lot of fa
Re:Ack. Insightful? (Score:2)
hope you'll stand that position when it comes to "unpopular" guantamo bay prisoners.
It's called hypocrisy (Score:2)
Re:It's called hypocrisy (Score:2)
This isn't hypocrisy, it's just inconsistency.
Re:Ack. Insightful? (Score:1)
Doesn't make either one less wrong.
Re:Ack. Insightful? (Score:2)
Agreed, both "perps" in these cases are deserving of fair punishment, but this has no bearing on how I feel...
Pointless Comparison (Score:2)
Bill Gates' credit card number was just one out of thousands of numbers taken from several servers. There is nothing to compare here. You're just trying to stir up shit with Linux zealots by creating an apparent double standard where none exists (or at least if it does, you're giving a terrible example).
Side note: the vast majority of people who claim to be "trying to help", regardless of what security measure they have circumvented, are actually just messing around for kicks and would rather be seen as a
Dude - (Score:1)
"...yes, General? I'd like to buy that slightly used supersonic fighter you have idling in your hangar, please. Payment? No problem, dude; you take Amex, right?"
OTOH, you're right to a point, though wouldn't "trying to help" involve some sort of notice to the victim?
Ya know... (Score:2, Insightful)
Re:Ya know... (Score:1)
b) Most professional commercial operations have redundant systems and don't go down when their single Althon gets hacked.
Re:Ya know... (Score:3)
MOD PARENT DOWN (Score:2, Insightful)
Re:Ya know... (Score:2)
I bet they have tripwire rigged up to a cluster server so when an intrusion is detected, it downs the affected server and brings another, fresh one online. They probably even auto-ghost the affected machine and bring it back online when reset. It's the Gatling Gun method of system security.
Re:That MCSE line was a joke, right? (Score:2)
Re:Ya know... (Score:2)
Re:Ya know... (Score:1)
Server break-ins and uptime are only a problem if you don't have the resources and equipment in place to facilitate a speedy transition to a redundant system
-----
A speedy and redundant transition of your web-server only proves one thing: it's just as speedy and redundant for the intruder to be on nearly every box on the network.
Maybe you have three rack systems for webspace and the intruder is only caught on that one PC that belongs to the secretary down the hall. What assurance do you have that tha
Re:Ya know... (Score:2)
Perhaps it's because MS is able to afford redunancy and the hardware and personnel to do frequent backups. They don't rely on a machine someone donated, funds given through a PayPal tip jar, and whatever free time contributors have to give.
You assume that because sites dedicated to open source, free software, whatever, disappear from time to time they are more secure. Taking a site offl
Running IIS? (Score:2, Funny)
Could it be?? (Score:3, Insightful)
Re:Could it be?? (Score:2)
It could be, but only because you trust the competant administrators to choose the right platform.
Unless you believe that an administrator who is competent can make a patch against a binary IIS, when no official solution exists. (If he could , then he is an uber-hacker. Not an administrator)
Re:Running IIS? (Score:1)
> Please tell me what I'm doing wrong, because I've never been broken into.
What's your IP? ;)
Re:Running IIS? (Score:2)
Fire away.
Re:Running IIS? (Score:1)
Interesting site.
Is it yours?
One problem with the 4 day in one 24 hour rotation theory however is that it is only true if the earth has 4 time zones. Since the earth actually has 24 time zones there are in reality 24 days in each rotation.
Of course since humans are the ones that choose to segment the earth into 24 time zones and since that was done mostly for convenience you can pretty much say that there are any ar
Dumb Cracker? (Score:4, Insightful)
According to Waugh, the GNOME Web servers that are hosted by Red Hat were compromised by "a dumb cracker who probably didn't realise what they got into".
Seems like he was smart enough to hack their system.
Re:Dumb Cracker? (Score:3, Interesting)
It would be interesting to learn how the compromise had occurred.
I'm guessing that all the important services would have been up to date (ssh/rsync/apache/etc) - so that leaves a password/ssh keycompromise, or some scripting flaw..
I hope we find out once the cleanup has been completed.
Re:Dumb Cracker? (Score:2, Funny)
They meant a white guy from Alabama - he was looking for 'gnome-porn'. ?!
Re:Dumb Cracker? (Score:1)
heh. I missed that connotation.
but this means they know who it was!
Re:Dumb Cracker? (Score:3, Informative)
Re:Dumb Cracker? (Score:2, Funny)
So the dumb cracker was really a smart cookie?
Re:Dumb Cracker? (Score:1, Interesting)
When you are so exposed on the Internet as gnome.org, you also need good sysadmins, not only good programmers. GNU/Linux alone doesn't do the trick. I don't see why people are saying how wise of them to move everything off-line and delay the release. They were idiots in the first place because they
Re:Dumb Cracker? (Score:4, Informative)
Re:Dumb Cracker? (Score:3, Interesting)
Intrusion Method Same Of Gnu.org Intrusion? (Score:4, Interesting)
Still, I am happy to see that this will not push the next version of Gnome back very much. It is really starting to look nice to me and I am a Mac OS X user.
Re:Intrusion Method Same Of Gnu.org Intrusion? (Score:1)
GNU website attack used a kernel local security flaw in do_brk() which allowed a normal user to get root privileges. This flaw was quickly fixed, and I think it is more than unlikely that the Gnome project website is still running an unpatched kernel.
Gnome being closely related to the GNU project, I wonder if there could be a relation between the two attacks ?
Re:Intrusion Method Same Of Gnu.org Intrusion? (Score:2)
That is an interesting thought. Did they ever discover who was behind the gnu.org compromise?
On the other hand. (Score:2)
Re:On the other hand. (Score:2)
Just because an open source company does something "nice" doesn't mean to say they did it because they're open source. It means absolutely nothing.
Deja Vu (Score:5, Funny)
I bet in a week the source code for GNOME 2.6 will be all over the Internet, free for anyone to take, read, and use!
Goes to show, Open Source != always secure (Score:1, Insightful)
Gnome website hosted on IIS server? (Score:2, Funny)
Something's not right here. Does this mean that the Gnome website is hosted on an IIS webserver? I mean, we all know that only IIS servers are insecure.
Or could it be that system security depends more on diligent admins than software?
Re:Gnome website hosted on IIS server? (Score:1)
Can't be. We all know that anyone who runs Linux has perfect security!
What's funny is the lame self delusion - if there were 5 Linux compromises a week to one IIS they woudl simply claim that the IIS ones are unreported
Re:Gnome website hosted on IIS server? (Score:1)
no os or server package is 100% airtight, but some have more default leaks then others...
Oh no! (Score:1, Redundant)
For the tinhat owners. (Score:2)
New features in 2.6? (Score:1, Offtopic)
I'm curious as to what improvements have been made.
Impatient bastard! (Score:2, Funny)
Probably a SCO advocate (Score:3, Funny)
This sort of thing is exactly what I'd expect from freedom-hating closed-source advocates. No doubt, some SCO fan went and did this in retaliation for the Linux developers' attempts to preserve their intellectual property rights.
There is a dark side of the commercial software community and now we are beginning to see it emerge.
(Warning: this article contains sarcasm.)
Where is the code? (Score:1, Redundant)
Oh right, *open* source software....
Re:Correlation? (Score:2, Informative)
Re:Correlation? (Score:2)
I mean, let's face it. That would just completely destroy their reputation, contrary to word that their servers have been hacked.
Re:Correlation? (Score:1)
You mean, they'll delay GNOME 2.6 before March 31th to Summer, and before Summer they delay it again and so on?
No please! I want my GNOME!
Re:Correlation? (Score:1)
In the case of proprietary software development, the driving force is generally that promises have been made to (current and future) customers. Breaking those promises can hurt the customer's perception of the reliability of the development organization. Perhaps more importantly, it can hurt the managers' and developers' self-image.
It seems to me that these motives would also apply to an Open Source project. After all, no o
Re:It's just a hoax (Score:2, Interesting)
Also, this attack reminds me of the one to the Debian servers, because it occurred just before a Woody release. Let's wait and see what the Gnome team has to say about it.
Re:It's just a hoax (Score:2)
I submit "Paris Hilton Device" as a candidate.
Re:It's just a hoax (Score:1)
Re:Confidence ? (Score:4, Insightful)
The point is, after a breakin you must determine when the breakin occured, because everything after that is suspect. The problem is it can sometimes be very difficult -- or impossible -- to determine when the breakin happened. Then you're really, really screwed.
Re:Intrusion? I thought linux was secure! (Score:2)
Re:Linux on the desktop? Fair question, on topic. (Score:3, Insightful)
No, dumbass, the difference is that closed-source companies keep it a secret (or doesn't know in the first place) when their servers are compromised while Gnome and Debian are very up-front about it.
If you think this kind of thing hasn't happened to Microsoft, Oracle, etc., you're wrong. They just like to keep it quiet.
Re:Linux on the desktop? Fair question, on topic. (Score:1)
So you say that because FOSS projects let us know of security breaches, that means that somehow they are more secure? If their security is breached, it does not matter whether they tell someone or not, the fact remains that their security has been breached. Of course being a FOSS project you will try to spin
Re:Half-Life 2, anyone? (Score:1)