Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Hackers send Sendmail a message [Open Source Software Hacked]</
CNET News.com ^ | October 9, 2002, 4:21 PM PT | Robert Lemos

Posted on 10/09/2002 5:54:22 PM PDT by Bush2000

Hackers send Sendmail a message

Online vandals hacked into the primary download server for Sendmail.org and replaced key software with a Trojan horse, a Sendmail development team member said Wednesday. The apparent attack on Sendmail didn't leave a back door in the popular open-source e-mail software package, as previously believed, but compromised the download software on the Sendmail consortium's primary server so that every tenth request for source code would receive a modified copy in reply.

"The exploited code that we see is not in our (development) tree at all," said Eric Allman, chief technology officer of Sendmail Inc., which sells a version of the open-source e-mail server program, and a member of the Sendmail Consortium, the development group for the software. "It seemed to be going to the (Sendmail) host, but it was delivering a corrupted file that wasn't on our server anywhere."

The problem apparently only affects source code for version 8.12.6 of Sendmail downloaded between Sept. 28 and Oct. 6, according to an advisory posted by the Computer Emergency Response Team (CERT) Coordination Center on Tuesday.

While the Sendmail development group is only just starting its forensic analysis of the computer that hosted the files, Allman said that its current theory is that the FTP (file transfer protocol) server had been hacked. If a user tried to download the latest Sendmail source code from the ftp.sendmail.org server, a compromised copy of the code would be sent instead about 10 percent of the time.

"It was a little bizarre that way," said Allman.

If the evidence confirms the theory, the hack would definitely be a strange way to compromise a downloadable file, said Marc Maiffret, chief hacking officer for security software firm eEye Digital Security.

"I'm not sure why they would want to do that," he said.

A Trojan horse--like the instrument that led to the downfall of the city of Troy--is a program that appears to be a legitimate piece of software but in fact has unwanted functions that allow a company or hacker to access the victim's computer.

The FTP server compromised by this attack apparently provided people who requested downloads not with the Sendmail source file, but with a Trojan-horse copy. This copy included a non-Sendmail test component that, when compiled, started a program that opens a covert channel to another server on the Internet. That server has since been configured to block the covert connection, according to messages posted to the Bugtraq security list.

Taking into account the 1-in-10 ratio, about 200 people may have downloaded the corrupted software over that eight-day period, said Sendmail's Allman. The development group is trying to contact everyone who downloaded the source code.

Both Sendmail and the CERT Coordination Center stressed that any software that is downloaded from the Internet should be verified using common cryptographic tools and the file's signature.

"Anyone that downloaded the code and followed good software practices would have found that this software was bogus," said Marty Linder, team leader for incident handling for CERT Coordination Center.

Linder stressed that, while the open development projects that give open-source its name may seem to invite problems like those of Sendmail, companies working on proprietary software have also run into problems.

In October 2000, Microsoft's source code may have been compromised by a hacker that penetrated the company's network allegedly with the help of a malicious program known as the Qaz Trojan.

"The same thing can happen if an intruder compromises the source tree of a private company," Linder said. "It's just another method for injecting badness into software."


TOPICS: Business/Economy; Technical
KEYWORDS: hack; hacker; opensource; sendmail; trojan
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-112 next last
To: for-q-clinton
I think it's important to note that all major software has bugs
Just a quick note: this isn't about bugs, but rather someone hacking into one of the 20 FTP servers that sendmail uses and adding malicious code to the sendmail download file.
What I can't understand is why new hacks come out against FTP every year. What is so hard about writting an anonymous ftp server? publicfile.org does just that.
21 posted on 10/09/2002 6:34:05 PM PDT by lelio
[ Post Reply | Private Reply | To 18 | View Replies]

To: Bush2000
Hey Wait, You're really a Boeing shill. Aren't they the largest employer in Seattle? Also I'm sure they run MS products. So you're probably a MS administrator for Boeing.

Hey, aren't my detective skills even better than the last guys?

22 posted on 10/09/2002 6:34:07 PM PDT by for-q-clinton
[ Post Reply | Private Reply | To 19 | View Replies]

To: for-q-clinton
Hey Wait, You're really a Boeing shill.

Aw, man. Nailed me!
23 posted on 10/09/2002 6:35:47 PM PDT by Bush2000
[ Post Reply | Private Reply | To 22 | View Replies]

To: lelio
I guess it depends on how they hacked the FTP service. If they guess an admin's password then yes I guess that wouldn't really be a bug, but rather poor admin skills.

If they hacked it via some bug, then I guess it's a bug.

24 posted on 10/09/2002 6:37:19 PM PDT by for-q-clinton
[ Post Reply | Private Reply | To 21 | View Replies]

To: Bush2000
I'm shocked, shocked, shocked that open source software has security issues ..

At least with open source, I don't have to trust the author. I can verify the integrity of the source myself. But anywho, I use Postfix instead of Sendmail because it has a higher level of SMTP security. A simple MD5 checksumming of the source would have shown the user that the source was corrupt. Nice thing about open source, the authors want you to help check the integrity. Mutual responsibility.

As for the hack, this was a vanity job. A sort of in your face, look at how "elite" I am.

25 posted on 10/09/2002 6:42:10 PM PDT by toupsie
[ Post Reply | Private Reply | To 1 | View Replies]

To: toupsie
I'm assuming if they had admin rights they could generate their own MD5 hash making that method of checking worthless and even giving you a false sense of security (which is worse).

I'll admit I'm just guessing here.

26 posted on 10/09/2002 6:45:37 PM PDT by for-q-clinton
[ Post Reply | Private Reply | To 25 | View Replies]

To: lelio
What I can't understand is why new hacks come out against FTP every year. What is so hard about writting an anonymous ftp server? publicfile.org does just that.

Not all of these attacks are outright hacks. Sometimes, they're just dictionary attacks against a weak admin password. Other times, they're buffer overflows caused by erroneous commands. Or man-in-the-middle attacks. FTP has notoriously weak security. Plaintext passwords. Etc.
27 posted on 10/09/2002 6:52:16 PM PDT by Bush2000
[ Post Reply | Private Reply | To 21 | View Replies]

To: toupsie
At least with open source, I don't have to trust the author. I can verify the integrity of the source myself.

That is, of course, assuming you have the technical skill to find this hack. But it wasn't discovered by more skilled eyes than yours, apparently.
28 posted on 10/09/2002 6:54:13 PM PDT by Bush2000
[ Post Reply | Private Reply | To 25 | View Replies]

To: toupsie
At least with open source, I don't have to trust the author. I can verify the integrity of the source myself.

I take it you don't use much open source code then, and surely not linux and especially apache. If you do use those, how long did it take you to review the entire code? Also which bugs did you find? Since I don't have the time, can I assume it's safe since you've reviewed the code (if you did)?

29 posted on 10/09/2002 7:02:33 PM PDT by for-q-clinton
[ Post Reply | Private Reply | To 25 | View Replies]

To: for-q-clinton
That's why the MD5 checksum should be taken from a known good source, like off of sendmail.org. Course people probably don't think about that and instead get the .sig off the same hacked site. Doh!
30 posted on 10/09/2002 7:05:53 PM PDT by lelio
[ Post Reply | Private Reply | To 26 | View Replies]

To: lelio
That's why the MD5 checksum should be taken from a known good source, like off of sendmail.org. Course people probably don't think about that and instead get the .sig off the same hacked site. Doh!

Doesn't this article say sendmail.org was the very site that was hacked. In that case MD5 is a false sense of security--doh!

31 posted on 10/09/2002 7:09:48 PM PDT by for-q-clinton
[ Post Reply | Private Reply | To 30 | View Replies]

To: for-q-clinton
It was one of the 20 FTP servers that they use. If they had the md5 checksum some other place, like on their website, that offers a little more protection. Or it could be posted to usenet or something like that.
32 posted on 10/09/2002 7:15:06 PM PDT by lelio
[ Post Reply | Private Reply | To 31 | View Replies]

To: lelio
I understand that, but if the site was hacked via a weak password, chances are they would be able to hack the website also.

The only point I'm making is MD5 is good to let you confirm you got a bad copy, but it doesn't guarantee a good copy.

33 posted on 10/09/2002 7:20:02 PM PDT by for-q-clinton
[ Post Reply | Private Reply | To 32 | View Replies]

To: Bush2000
Both Sendmail and the CERT Coordination Center stressed that any software that is downloaded from the Internet should be verified using common cryptographic tools and the file's signature.

Simple solution. Trust but verify. New 8.0 distro from Red Hat has disk checking software on the disk. Runs a test on the disks to verify they are originals copies, not trojans.

So a developer of the source can plant bugs/backdoors. Fancy that. News flash ... Bank tellers can steal from bank vaults. Who would have thought of that.

Unfortunately, what you get from the micro-crapware company can't be verified, or fixed. SP1 for XP unfixes some already installed fixes and leaves other security holes intact. You need to try and find out what got un-installed and find out what to do about it. The update does this without telling. Wonder why? didn't know? couldn't fix them all?

Penguin bites are fatal.

snooker

34 posted on 10/09/2002 7:22:27 PM PDT by snooker
[ Post Reply | Private Reply | To 1 | View Replies]

To: snooker
It sounds like you use linux. Can you please read post #29 and respond as if it was addressed to you?

Thank you.

35 posted on 10/09/2002 7:26:51 PM PDT by for-q-clinton
[ Post Reply | Private Reply | To 34 | View Replies]

To: for-q-clinton
I find these posts very informative. I like the change of pace. Also I rely on freepers to point out the good articles--like this one.

As far as this being "very informative" or "good"? How? 200 people may have downloaded it? Wow. Make it 2000. Stop the presses?

Bush2000 is screaming AGAIN about something that is not Microsoft. And what's the point? It has nothing to do with the purpose of this site. But let's pretend it did. He does not give much info. on the exploit itself. Or, points out how puny the event was. No, he makes a big red header as if this is something significant. It's not. And while you may refer to this as "a change of pace" it's not for him. This is about all he does here.

It's like he has Turrets Syndrome.

I've only recently begun to notice that he posts the same basic thing over and over. I asked him about this and he sent me email basically saying he like to start OS wars. He said he "trolls" here in that regard. All I've asked is why? And he has never really answered that.

It's not a question I would not ask of others. You, or posters like JohnHuang2, kattracks, MeeknMing, sarcasm, HAL9000, etc. who post on topics this site was built for.

I like this site and most of the people that come here. I think this site is special and Jim Robinson someone very unique. I read the things posted here. I'm just tired of seeing the same stuff from Bush2000. He has made it very clear to me the only reason he posts this kind of thing is for the conflicts it starts. Why?

36 posted on 10/09/2002 7:46:55 PM PDT by isthisnickcool
[ Post Reply | Private Reply | To 18 | View Replies]

To: isthisnickcool
Correction: It's a question I would not ask
37 posted on 10/09/2002 7:49:23 PM PDT by isthisnickcool
[ Post Reply | Private Reply | To 36 | View Replies]

To: Bush2000
Meanwhile...


38 posted on 10/09/2002 8:46:31 PM PDT by HAL9000
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
That is, of course, assuming you have the technical skill to find this hack.

That's the best part. With mailling lists and user groups, you have many eyes, some better some not, looking at the source code. The checksums are a must when receiving code. Also I tend to use not the "latest and greatest" unless there is a compelling security reason to do so. I let others be crash test dummies. With a production environment, if it ain't broke, don't fix it!

But it wasn't discovered by more skilled eyes than yours, apparently.

Yet it was. That is the point. It was discovered quickly and the information about the hack was immediately released. Something you won't get from a closed source product. Sendmail isn't worried about a black eye in front of investors.

39 posted on 10/09/2002 9:31:48 PM PDT by toupsie
[ Post Reply | Private Reply | To 28 | View Replies]

To: for-q-clinton
The hash generated by the author is encrypted and can't be faked. You could be misled into believing in the wrong (faked) author's key, however, but there are independent methods of ensuring you get the correct key so it is fairly unlikely. Some people don't bother to check or use software which is lame.

I suppose the application of sufficient computing power could crack the author's key. If you had that much power, however, you would be better off completely subverting the international funds transfer network, or bank atms, or vpns, etc.

40 posted on 10/09/2002 9:57:58 PM PDT by no-s
[ Post Reply | Private Reply | To 26 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-112 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson