[sf-lug] Advantages of distro package regimes
Charles N Wyble
charles at thewybles.com
Wed Dec 26 13:09:46 PST 2007
Kristian Erik Hermansen wrote:
> On Dec 26, 2007 1:33 PM, Charles N Wyble <charles at thewybles.com> wrote:
>
>> Your comments above imply that you know something about the security of
>> medibuntu. If you know of a vulnerability in there systems or processes
>> and do not report it to them you are doing a disservice to the
>> community. I certainly hope this is not the case?
>>
>
> It has nothing to do with specific vulnerabilities, although even if I
> did know something, it does not mean I am bad for not reporting it.
>
Well that is highly debatable. I believe that failing to report a
vulnerability especially in something so widely used as the medibuntu
3rd party repository is doing a disservice to the community.
> There are rampant vulnerabilities all over the place, and once you
> start looking, it becomes almost a full time job to report all of them
> that you see.
I am well aware of that. I am not some newbie. I have handled a number
of security incidents at various organizations.
> In fact, some people make careers in vulnerability
> reporting or affiliated commercial ventures.
Yep they sure do.
> I have reported lots of
> vulnerabilities, and most of the time, no one cares unless it is
> something really nefarious.
Well I go back to my original argument that a vulnerability in
medibuntu.org would be fairly nefarious.
> Now, let's just say that I could attack
> medibuntu.org? OK, so I still don't have the private GPG key perhaps,
> but a lot of users routinely override that APT warning.
Certainly. Just like users click through prompts without looking etc.
> In this
> sense, here is one thing I see wrong with medibuntu that is obvious.
> And remember, the more eyes on the resource, the more bugs that will
> be revealed (this is bug finding 101).
>
I am well aware of peer review and bug fixing. You don't need to point
that out to me. I have led several enterprise software projects and a
couple open source ones.
> The domain was recently registered, and only for a year. Do a whois
> if you like to verify.
No need. I don't think you would lie about something so easily verified :)
> Also notice that they do implement
> ClientTransferProhibited, but not ClientUpdateProhibited. If I cared
> enough, I am sure I could social engineer an update to the DNS records
> to point at my rogue server.
You certainly could. DNS attacks are very common.
> With the amount of traffic going to
> Ubuntu.com every day, this may not be possible (number of eyes).
> However, most people set medibuntu and forget it. It could be a
> matter of days before anyone noticed that it was being redirected. I
> would do it on a holiday weekend if I wanted to be really sneaky.
> These things do happen.
>
Yes they do. And its something to keep an eye out for. Some people have
automated checks in place for this sort of thing, depending on there
threat profile etc.
> Additionally, Medibuntu has a very large attack surface. This is not
> a good thing. What do I mean? Here is some evidence for you to
> contemplate...
>
>
Have you ever heard of a honeypot? The nmap output below is quite common
on systems that are running honeypot software.
More information about the sf-lug
mailing list