Date: Fri, 1 Jun 2001 01:27:52 +0200 From: "Karsten W. Rohrbach" <karsten@rohrbach.de> To: Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca> Cc: freebsd-security@freebsd.org Subject: Re: Apache Software Foundation Server compromised, resecured. (fwd) Message-ID: <20010601012752.C85717@mail.webmonster.de> In-Reply-To: <200105312300.f4VN0RD24448@cwsys.cwsent.com>; from Cy.Schubert@uumail.gov.bc.ca on Thu, May 31, 2001 at 04:00:17PM -0700 References: <200105312300.f4VN0RD24448@cwsys.cwsent.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--R+My9LyyhiUvIEro Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable this was one "result" of the comromised ssh binary at sourceforge. i don't want to think about it aloud in public what's next :-( last | grep sourceforge for (every account affected) pw usermod "account" -h - sh*t /k Cy Schubert - ITSD Open Systems Group(Cy.Schubert@uumail.gov.bc.ca)@2001.05= .31 16:00:17 +0000: > Some of you might be interested in this. >=20 >=20 > Regards, Phone: (250)387-8437 > Cy Schubert Fax: (250)387-5766 > Team Leader, Sun/Alpha Team Internet: Cy.Schubert@osg.gov.bc.ca > Open Systems Group, ITSD, ISTA > Province of BC =20 >=20 >=20 > ------- Forwarded Message >=20 > Date: Wed, 30 May 2001 23:05:59 -0700 (PDT) > From: Brian Behlendorf <brian@apache.org> > X-X-Sender: <brian@localhost> > To: announce@apache.org > Subject: Apache Software Foundation Server compromised, resecured. > Message-ID: <Pine.BSF.4.31.0105302301190.41134-100000@localhost> > MIME-Version: 1.0 > Content-Type: TEXT/PLAIN; charset=3DUS-ASCII > X-Spam-Rating: h31.sny.collab.net 1.6.2 0/1000/N >=20 >=20 > Earlier this month, a public server of the Apache Software Foundation > (ASF) was illegally accessed by unknown crackers. The intrusion into > this server, which handles the public mail lists, web services, and > the source code repositories of all ASF projects was quickly > discovered, and the server immediately taken offline. Security > specialists and administrators determined the extent of the intrusion, > repaired the damage, and brought the server back into public service. >=20 > The public server that was affected by the incident serves as a source > code repository as well as the main distribution server for binary > release of ASF software. There is no evidence that any source or binary > code was affected by the intrusion, and the integrity of all binary > versions of ASF software has been explicitly verified. This includes > the industry-leading Apache web server. >=20 > Specifically: on May 17th, an Apache developer with a sourceforge.net > account logged into a shell account at SourceForge, and then logged > from there into his account at apache.org. The ssh client at > SourceForge had been compromised to log outgoing names and passwords, > so the cracker was thus able get a shell on apache.org. After > unsuccessfully attempting to get elevated privileges using an old > installation of Bugzilla on apache.org, the cracker used a weakness in > the ssh daemon (OpenSSH 2.2) to gain root privileges. Once root, s/he > replaced our ssh client and server with versions designed to log names > and passwords. When they did this replacement, the nightly automated > security audits caught the change, as well as a few other trojaned > executables the cracker had left behind. Once we discovered the > compromise, we shut down ssh entirely, and through the serial console > performed an exhaustive audit of the system. Once a fresh copy of the > operating system was installed, backdoors removed, and passwords > zeroed out, ssh and commit access was re-enabled. After this, an > exhaustive audit of all Apache source code and binary distributions > was performed. >=20 > The ASF is working closely with other organizations as the investigation > continues, specifically examining the link to other intrusion(s), such > as that at SourceForge (http://sourceforge.net/) [ and php.net > (http://www.php.net/). ] >=20 > Through an extra verification step available to the ASF, the integrity > of all source code repositories is being individually verified by > developers. This is possible because ASF source code is distributed > under an open-source license, and the source code is publicly and freely > available. Therefore, the ASF repositories are being compared against > the thousands of copies that have been distributed around the globe. > While it was quickly determined that the source code repositories on the > ASF server were untouched by the intruders, this extra verification step > provides additional assurance that no damage was done. >=20 > As of Tuesday, May 29, most of the repository has been checked, and as > expected, no problems have been found. A list of verified modules > will be maintained, and is available here: > http://www.apache.org/info/hack-20010519.html >=20 > Because of the possible link of the ASF server intrusion to other > computer security incidents, the investigation is ongoing. When > complete, the ASF will offer a complete and public report. >=20 > The Apache Software Foundation strongly condemns this illegal > intrusion, and is evaluating all options, including prosecution of the > individual(s) responsible to the fullest extent of the law. Anyone > with pertinent information relating to this or other related events > should contact root@apache.org. Anyone from the media with further > interest should contact press@apache.org. >=20 > Thanks. >=20 > Brian Behlendorf > President, Apache Software Foundation >=20 >=20 >=20 >=20 > - --------------------------------------------------------------------- > You have received this mail because you are subscribed to the > announce@apache.org mailing list. > To unsubscribe, e-mail: announce-unsubscribe@apache.org > For additional commands, e-mail: announce-help@apache.org >=20 >=20 > ------- End of Forwarded Message >=20 >=20 >=20 >=20 > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message --=20 > Unix is very simple, but it takes a genius to understand the > simplicity. --Dennis Ritchie KR433/KR11-RIPE -- WebMonster Community Founder -- nGENn GmbH Senior Techie http://www.webmonster.de/ -- ftp://ftp.webmonster.de/ -- http://www.ngenn.n= et/ karsten&rohrbach.de -- alpha&ngenn.net -- alpha&scene.org -- catch@spam.de GnuPG 0x2964BF46 2001-03-15 42F9 9FFF 50D4 2F38 DBEE DF22 3340 4F4E 2964 B= F46 --R+My9LyyhiUvIEro Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7FtN4M0BPTilkv0YRAgRGAJ9c03xTecsnn5vooTZXl3ngMNBIlQCgjTs8 mJQ3Adm6N9CYIMgOPdT0dyg= =n2bf -----END PGP SIGNATURE----- --R+My9LyyhiUvIEro-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010601012752.C85717>