Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

GNU Servers Hacked, Linux Software May Be Compromised
Internet Week ^ | Aug. 14, 2003 | Techweb News

Posted on 08/14/2003 4:50:43 PM PDT by Spruce

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-24 last
To: Servant of the Nine
Your comments, I presume, were sarcastic... but in case anybody wonders, here is what www.fsf.org is running. (Linux and Apache -- no surprize there). Thanks to NetCraft where you can learn what any webserver is running. You can also do that, in fact, learn what software net-connected system is running (and many more useful things), with NMap, from insecure.org.

And here is the FSF statement on the crack. There are some very interesting facts buried in there:

It is pessimistic to say that nothing can be cracked. It is quite possible to build a secure Linux. And OpenBSD is secure right out of the box. Mac OSX and OSX Server are also very, very difficult to root in the default install, and they do maintain themselves, Windows XP-style.

"Root, God, what is difference?" - Pitr of UserFriendly.

A lot of end users don't understand the difference between the vulnerabilities of OSS systems and the way these vulnerabilities are addressed, and Microsoft's innately single-user systems and their "security through obscurity" approach. Either system is toast if your admins drop the ball, as FSF did here. But the closed-source system is also toast if the crackers discover an exploit that the maintainers have been hiding so as not to "alarm" the users.

People who have spoken for security for one major closed-source vendor have traditionally come from marketing or PR backgrounds, and been extremely weak on security theory. That's probably all you can do if you build on a feeble architecture.

d.o.l.

Criminal Number 18F

21 posted on 08/14/2003 8:01:12 PM PDT by Criminal Number 18F
[ Post Reply | Private Reply | To 7 | View Replies]

To: Criminal Number 18F
There are some very interesting facts buried in there:

- the perpetrator was a local, not net, user

- the presumed target was passwords

- none of the source on the machine has come up compromised

I'd be careful referring to those points as "facts", especially considering the word "presumed" is used in one of them. Some of the most sophisticated attacks first compromise a local workstation before attacking the server, and that very well could have happened here.

We will probably never know the exact details, especially considering it was months ago, an eternity for a talented hack to cover his steps. Your only 100% safe course of action is to rebuild your system if you downloaded any components from the site over the last six months using newly verified source files.

22 posted on 08/14/2003 8:12:58 PM PDT by Golden Eagle
[ Post Reply | Private Reply | To 21 | View Replies]

To: Servant of the Nine
Just because the Linux source code is stored there doesn't mean thte servers are running it.

The GNU ftp server hosts the source distributions for the GNU software tools, not the Linux kernel itself, which is hosted at ftp.kernel.org.

23 posted on 08/14/2003 9:12:35 PM PDT by dwollmann
[ Post Reply | Private Reply | To 7 | View Replies]

To: KayEyeDoubleDee
This begs that question of whether the GNU CVS repository could have been compromised in such a way that the diffs could be hidden. I guess that since CVS actually keeps changes to, rather than complete copies of each version, this might be hard to do.

They could have hacked the diffs so that the changes appeared to always have been present in the sources.
24 posted on 08/15/2003 9:41:01 AM PDT by Bush2000
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-24 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson