The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


GLSA: rsync.gentoo.org rotation server compromised (200312-01)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 03 Dec 2003 10:53:37 -0700
From: Daniel Robbins <drobbins@gentoo.org>
To: gentoo-announce@gentoo.org, bugtraq@securityfocus.com
Subject: GLSA: rsync.gentoo.org rotation server compromised (200312-01)

--=-wiiF/t1np2lx7vR5b1PV
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

- -------------------------------------------------------------------------=
--
GENTOO LINUX SECURITY ANNOUNCEMENT 200312-01
- -------------------------------------------------------------------------=
--

GLSA:        200312-01
summary:     rsync.gentoo.org rotation server compromised
severity:    normal
date:        2003-12-02
CVE:         None
exploit:     remote

DESCRIPTION:

On December 2nd at approximately 03:45 UTC, one of the servers that makes u=
p
the rsync.gentoo.org rotation was compromised via a remote exploit.  At thi=
s
point, we are still performing forensic analysis.  However, the compromised
system had both an IDS and a file integrity checker installed and we have a
very detailed forensic trail of what happened once the box was breached, so
weare reasonably confident that the portage tree stored on that box
wasunaffected. =20

The attacker appears to have installed a rootkit and modified/deleted some
files to cover their tracks, but left the server otherwise untouched. The b=
ox
was in a compromised state for approximately one hour before it was
discovered and shut down. During this time, approximately 20 users
synchronized against the portage mirror stored on this box. The method used
to gain access to the box remotely is still under investigation.  We will
release more details once we have ascertained the cause of the remote
exploit. =20

This box is not an official Gentoo infrastructure box and is instead donate=
d
by a sponsor. The box provides other services as well and the sponsor has
requested that we not publicly identify the box at this time. Because the
Gentoo part of this box appears to be unaffected by this exploit, we are
currently honoring the sponsor's request.  That said, if at any point, we
determine that any file in the portage tree was modified in any way, we wil=
l
release full details about the compromised server. =20

SOLUTION:

Again, based on the forensic analysis done so far, we are reasonably
confident that no files within the Portage tree on the box were affected.
However, the server has been removed from all rsync.*.gentoo.org rotations
and will remain so until the forensic analysis has been completed and the b=
ox
has been wiped and rebuilt. Thus, users preferring an extra level of securi=
ty
may ensure that they have a correct and accurate portage tree by running:

emerge sync

Which will perform a sync against another server and ensure that all files
are up to date.



--=-wiiF/t1np2lx7vR5b1PV
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQA/ziMhffezrJ9WV/IRAjnoAJ9/SFs9vrBEVdlC6VtgYGo1w/fdYwCfRQZN
gljMgV9c5BdZpwufb+tVopI=
=WglF
-----END PGP SIGNATURE-----

--=-wiiF/t1np2lx7vR5b1PV--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру