Date: Thu, 2 Dec 2010 14:55:04 -0800 From: Rob Farmer <rfarmer@predatorlabs.net> To: Chuck Swiger <cswiger@mac.com> Cc: Ivan Klymenko <fidaj@ukr.net>, freebsd-ports@freebsd.org Subject: Re: ftp/proftpd 1.3.3c with a version which contained a backdoor. Message-ID: <AANLkTikYAv%2BuSykLBawfiZYSeU=2ze=6TVUmsQvP573V@mail.gmail.com> In-Reply-To: <17BFBD62-414E-448B-A3CE-825C9467138E@mac.com> References: <20101202232206.66c672a1@ukr.net> <17BFBD62-414E-448B-A3CE-825C9467138E@mac.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Dec 2, 2010 at 14:00, Chuck Swiger <cswiger@mac.com> wrote: > Presumably/hopefully, the proftpd tarball which contained the backdoor would fail to match the distinfo for the port: > > SHA256 (proftpd-1.3.3c.tar.bz2) = ea7f02e21f81e6ce79ebde8bbbd334bd269a039ac9137196a35309f791b24db1 > SIZE (proftpd-1.3.3c.tar.bz2) = 4166609 > > Checking, the tarball you now fetch is the one which matches their md5 and GnuPG signing from the link above... For several hours on Wednesday the distinfo was updated to the compromised version (it has been reverted), so anyone who updated this port recently should check their system. -- Rob Farmer
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?AANLkTikYAv%2BuSykLBawfiZYSeU=2ze=6TVUmsQvP573V>