The word from kernel.org
make sure your systems are uncompromised", a problem which is addressed by the second message. "The compromise of kernel.org and related machines has made it clear that some developers, at least, have had their systems penetrated. As we seek to secure our infrastructure, it is imperative that nobody falls victim to the belief that it cannot happen to them. We all need to check our systems for intrusions."
Posted Oct 1, 2011 15:15 UTC (Sat)
by slashdot (guest, #22014)
[Link] (12 responses)
Here is a much more sensible set of steps:
Posted Oct 1, 2011 15:18 UTC (Sat)
by gregkh (subscriber, #8)
[Link]
We were just offering a list of things that can be helpful to do, if you wish to try to detect if your machines are compromised or not.
I never said, "if you do these things you are clean", as that would be folly.
Thanks for your list.
Posted Oct 1, 2011 15:23 UTC (Sat)
by slashdot (guest, #22014)
[Link]
Posted Oct 1, 2011 15:48 UTC (Sat)
by welinder (guest, #4699)
[Link] (7 responses)
If you have an attacker with that level of sophistication (i.e.,
You're going to have to reflash every piece of software in there,
Every piece of software, btw., includes anything executable in
* Dot-files
And what about video files? MPlayer and/or the libraries it uses
So /home really has to go too. Files you can inspect can be
Posted Oct 1, 2011 15:53 UTC (Sat)
by abacus (guest, #49001)
[Link] (1 responses)
Posted Oct 1, 2011 20:30 UTC (Sat)
by robbe (guest, #16131)
[Link]
Exploiting network-facing daemons is so last century.
Posted Oct 1, 2011 21:25 UTC (Sat)
by jrn (subscriber, #64214)
[Link] (3 responses)
Well, let's say you discover that a friend's house is bugged. You're worried that your house might be bugged, too. Do you:
A. Incinerate all your belongings, break off all relationships to previous friends, and start a new life in another country?
or:
B. Use whatever half-measures you deem appropriate to check the house for bugs (or get a new house), and then move on with your life?
Posted Oct 3, 2011 5:09 UTC (Mon)
by jcm (subscriber, #18262)
[Link] (2 responses)
The moral of this little story is we can all go batsh*t crazy and take this as far as we like, but in the end the only secure thing is to just go in a hole somewhere without network access. Failing that, plan for when you will be rooted the next time.
Posted Oct 3, 2011 8:11 UTC (Mon)
by jezuch (subscriber, #52988)
[Link] (1 responses)
Ah, the "Press Enter" scenario. But no network access is not enough. Remember the pipes.
Posted Oct 3, 2011 8:37 UTC (Mon)
by GhePeU (subscriber, #56133)
[Link]
<cryptonomicon>You forgot Van Eck phreaking.</cryptonomicon>
Posted Oct 2, 2011 16:39 UTC (Sun)
by lkundrak (subscriber, #43452)
[Link]
Posted Oct 1, 2011 17:47 UTC (Sat)
by dashesy (guest, #74652)
[Link]
These instructions are recursively infinite, they rely on the existence of another uncompromised machine, that need to be validated with the same steps.
Posted Oct 3, 2011 10:57 UTC (Mon)
by yoshi314 (guest, #36190)
[Link]
not that i condone that kind of a solution, though.
Posted Oct 1, 2011 18:33 UTC (Sat)
by josh (subscriber, #17465)
[Link]
The word from kernel.org
1. Unplug the network cable
2. If your motherboard has it, use an hardware function to restore the original BIOS from ROM
3. If not, flash the BIOS via software, and hope that isn't intercepted by the existing potentially trojaned BIOS; alternatively, replace the motherboard
4. Boot from a distribution CD burned from an uncompromised machine
5. Make a copy of all the filesystem except /home and /root
6. Remove any packages not found on the distribution CD (keep a list for later)
7. Reinstall all packages from the packages in the distribution CD
8. Make sure no non-distribution software is being set to be executed by default, or has the same name of system binaries
9. Make sure no non-reinstalled configuration file contains malicious or insecure script or executable code
10. Reboot, make sure the BIOS isn't network booting, configure the firewall to block any new incoming connection, then plug the network cable in
11. Run any checking tool you can find
12. Launch an automatic package upgrade
13. Reinstall all non-distribution software
14. Flash your BIOS to the latest version if needed
15. Fine-tune your firewall policy
The word from kernel.org
The word from kernel.org
The word from kernel.org
*they* are after you), then this is a half measure only.
probably including what's on the disks' control boards and the
video card(s). Maybe even the keyboard. (And if *they* had
physical access, don't bother. Just have it smashed to single
atoms.)
/home:
* Makefiles
* Scripts
* Compiled binaries (including libraries and .o files)
* Source files that might have been trojaned
* Configuration files for, e.g., git repositories.
has more holes than a Swiss cheese (which is why it segfaults so
often on corrupted files). That would be a sneaky place to put
something that restores *their* control.
recovered on a one-to-one basis.
Cleaning up an infected system
Blocking inbound connections
The word from kernel.org
The word from kernel.org
The word from kernel.org
The word from kernel.org
The word from kernel.org
The word from kernel.org
The word from kernel.org
The word from kernel.org