[sf-lug] Malware hidden in Linux packages First Gentoo more lately Arch.
Rick Moen
rick at linuxmafia.com
Thu Jul 12 14:23:41 PDT 2018
I thought I should also respond to the 'first Gentoo' part of
the Subject header. (Note: I neither a Gentoo person nor an Arch Linux
one, though I respect both projects highly.)
As it turns out, it is _also_ absolutely not true to claim that Gentoo
Linux packages got 'malware'. But details of the June 28th incident
may be of interest.
Gentoo Linux maintains, as a _side_ (external, downstream) code repository,
an 'organization' (basically a customer set of group-account features)
on the third-party commercial hosting service GitHub -- which should not
be confused with Gentoo's own infrastructure. Reportedly, someone's
login password got stolen.
Some pretty good commentary by a Gentoo person, excerpted from
https://blog.sumptuouscapital.com/2018/06/my-comments-on-the-gentoo-github-hack/
Gentoo has mainly had a presence on GitHub in order to facilitate pull
requests from external contributors and proxied maintainers, actually,
using GitHub for anything critical goes against the Gentoo Social
Contract. [link]
The primary method of synchronizing the Gentoo Ebuild Repository is
using rsync, and github was never part of the mirroring infrastructure
for rsync. Furthermore; for Portage users, gemato is used to verify the
MetaManifests and in turn the ebuilds using OpenPGP (aka GPG aka PGP)
signatures by default.
So to make it absolutely clear; mirror in the case of GitHub compromise
doesn't mean it automatically results in the ebuilds being distributed
to the users using regular update mechanisms.
On a different mailing list (GoLUG's), I observed:
FWIW, looks like the compromise lasted only 1 hour and 9 minutes, before
Gentoo responded by getting access to the GitHub mirror's contents
'frozen' (curtailed).
https://wiki.gentoo.org/wiki/Github/2018-06-28
On that mailing list, a friend observed:
Still, one more evidence against outsourcing tech easily done yourself
to an outsider.
And I replied:
If nothing else, there was a lag caused by the need to motivate GitHub
staff to take action:
20:49:xx First abuse report to GitHub support
20:51:xx Infra's informal contact to GitHub via multiple personal channels
20:53:xx Second abuse report to GitHub
21:00:xx (approx) GitHub informal report that they are starting to look
21:05:xx Infra's formal ticket to Github Support
21:28:xx Github support responds; Gentoo Github org frozen.
In-house, it would have been just ssh'ing in and (probably) a single
shell command. Boom.
Anyway, tl;dr version:
1. No, Gentoo's own software infrastructure _wasn't_ affected, just an
outside commercially hosted facility where the customer-admin login
was briefly taken over because of stolen password, and brief mischief
done.
2. Gentoo itself was totally unaffected.
3. Shutting down the third-party compromise took an hour because
outsourcing creates that (high) risk of delayed response, among others.
More information about the sf-lug
mailing list