Debian development server compromise



Sans also brings this story about the Debian development server being compromised. Investigation is ongoing. The machine was gluck.debian.org and hosted CVS among other things (ddtp, lintian, people, popcon, planet, ports, release). It has been taken offline currently for a reinstall, other systems have been locked down until they can patch the vulnerability that they suspect was exploited. More details will be announced.


An update that I’ve seen today is that apparently a developer account with a weak password was compromised. Then the attacker used a LOCAL vulnerability to escalate privileges. The lesson to be learned here is that no matter how secure your network services are, the soft underbelly is the list of users that can log in to the machine (if that’s allowed.) I mean…. if you have a tight ssh config and let bob@yourmachine.com use “bob” for his password…. good luck.

Network facing services deserve HARD passwords. One of the best suggestions I’ve heard for creating hard passwords that can be more easily remembered….. Think of a sentence, use the first letter of each word, substituting numbers in where possible. For instance…. “Look Before you Leap” would become… Lb4YL this is fairly short, but better than “look” It’s also suggested to vary the case (upper/lower).

Related Posts

Blog Traffic Exchange Related Posts
  • Real VNC 4.1.1 vulnerability - Remote Access without password This is one worth checking out anybody using vnc for remote administration. It looks as though intelliadmin has come across a vulnerability in Real VNC 4 (the slashdot post I saw suggested "any machine running VNC 4.1") I haven't tested yet, so I don't know if this ONLY affects REALVNC's......
  • Blackberry vulnerability to be released soon Between the Lines is warning that Blackberry Enterprise servers ought to be placed in the DMZ (if not already.) There is word that a critical vulnerability will be announced on August 14th. (And if we already know that's coming then SOMEONE knows what that vulnerability is.) It basically uses software......
  • 5198 Security Vulnerabilities tracked by US-CERT in 2005 The headline probably says most all... 5198 vulnerabilities tracked by US-Cert in 2005. This comes from The SecurityFix. It's probably not every vulernability that was out in 2005, just those that US-CERT issued advisories for. The breakdown is 812 in Windows 2,328 in various Unix/Linux/Mac/BSD systems and 2,058 affecting multiple......
Blog Traffic Exchange Related Websites
  • Inspire Yourself First, Think "Success" Later - Internet Marketing Is A Business, Not A Fantasy~ [/caption] I get several emails every day from people I've met at seminars, or who've found me on Facebook or Twitter, people who are new to Internet Marketing and only looking at it with awe-stricken eyes and nothing more, It's almost as if someone's deliberately put them in some......
  • The Benefits of Leveraging Debt to Create Multiple Income Streams Let’s face it, debt has managed to earn itself a pretty bad name in most circles, but in many cases, this stigma is undeserved. Debt, when used properly, can help you secure your financial future. While no one is arguing that improperly used debt is a bad thing, good debt......
  • The Myth of The "Single" Keyword - Niche Marketing To be successful in niche marketing, to be able to pick the right niche.. .. you need to first do some extensive keyword research - What are people searching about and which of those keywords has fairly low competition in the form of SEO'ers or PPC Advertisers on search......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site