|
|
Subscribe / Log in / New account

RPM Fusion, wiki defacement, and bug reporting

By Jake Edge
July 30, 2014

There are lots of ways to alert a project to a perceived security problem, but defacing its wiki is not high on anyone's preference list. Doing so does have one advantage, however: raising the visibility of the complaint—unfortunate though that may be. So, on the one hand, it is a truly obnoxious act, but on the other it draws attention to a problem that may have been languishing. A recent incident with the RPM Fusion project is a perfect demonstration of that.

RPM Fusion maintains a repository of RPMs for Fedora and Red Hat Enterprise Linux (RHEL). Those RPMs are for packages that Red Hat cannot or will not distribute for various reasons, typically legal issues such as patents. So, things like multimedia codecs, game system emulators, proprietary graphics drivers, and so on will be found in the repository. Three early repositories, Livna, Freshrpms, and Dribble, came together in 2007 to form RPM Fusion.

Users who wish to view internet videos or listen to MP3 files on their Fedora systems are likely to have added RPM Fusion as a source in their /etc/yum.repos.d directory by following the instructions on the RPM Fusion wiki. But those instructions were the target of some defacement on July 26.

A look at the history of the page shows multiple edits from Nikita Churaev (aka lamefun.x0r), interspersed with reverts from Nicolas Chauvet and Jonathan Dieter. The first change was evidently a test to see if a new user could edit the wiki to alter the download links for the packages that "install" RPM Fusion (i.e. place it into the system's Yum repository list). When that was successful, Churaev filed a bug in the project's Bugzilla noting that the initial download (install) of RPM Fusion is insecure. More defacement followed.

The complaints listed in the bug are quite sensible. Anyone can go in and change the wiki links, key IDs, key fingerprints, etc., to lead users to install malware. Even if those malicious edits are noticed and reverted quickly, there is still a window in time where users could be fooled. In addition, anyone can upload a GPG key to the public key servers that purports to be from the RPM Fusion project, so a malicious key that was listed on the wiki could easily be made to pass some basic sanity checks.

One possible malicious scenario would be for an attacker to change the key ID and fingerprints on the wiki to those of keys controlled by the attacker. Then, switching the links to the install packages to malicious versions would lead (some) users to download and install them, which would place the attacker's repository into the Yum configuration. That would allow the attacker to provide a steady stream of malware to the user that was disguised as RPM Fusion packages and all, seemingly, signed with an RPM Fusion key. There are other ugly possibilities too, of course.

One major underlying problem is that the wiki is not accessible over HTTPS, which allows for man-in-the-middle attacks. Clients using SSL/TLS (and checking the validity of the certificate) would be able to ensure that the web page data was coming from the project if that were offered. HTTPS wouldn't, of course, solve the problem of anyone being able to alter the wiki, but a static page or two with the key information that was served up over HTTPS would go a long way toward solving the problems Churaev is reporting.

In fact, an earlier bug filed by Churaev is explicit about that. That bug was filed at the end of 2012 and has seemingly not been touched since. More than a year and a half without any action on the bug appears to have been something of a trigger that led to the wiki defacement (which branched out further, to the wiki front page as well).

Dieter posted to the developers mailing list about the defacement problem. He recommended that the wiki be locked down. But Churaev was not impressed with that response, noting that the defacement problem had happened before, which should have served as a wakeup call. The thread died there, however, after two messages, which should probably be a bit worrisome to those who use RPM Fusion.

As Dieter pointed out in a comment on the most recent bug, though, insulting the project and defacing the wiki are not actually helping to solve the problems Churaev has identified. In fact, that kind of activity is counterproductive:

But vandalizing the wiki is not the right way to fix the problem. Not-so-subtle threats to plant links to malware in the wiki won't fix the problem. All you're doing is irritating people and making them less likely to listen to you. If you actually want to *fix* the problem, then suggest some concrete solutions.

He went on to list some ideas for ways that Churaev could improve the situation. Others also commented on the bug report, expressing interest in helping to pay for an SSL certificate if that is what is needed. But, again, there was no official response. The bug is open, but so is the wiki. Project leaders are either not paying attention or not taking any visible action. That also should be a bit worrisome to users of the repository.

That's the real crux of the issue, in the end. It would seem that there have been a number of incidents (other defacements, Churaev's original bug report) that should have spurred action on these problems, but hasn't, for whatever reason. There probably isn't too much danger for attentive users, who are knowledgeable about keys, signatures, and the like, but the risk is certainly not zero. For less technical users, who might just follow instructions somewhat blindly, the risk is substantially higher—while still perhaps being fairly low in the grand scheme of things.

But the attitude of the project leaders matters. Even volunteers have some responsibility to secure their public sites, or to at least warn users of the risks. So far, at least, RPM Fusion has seemingly done neither. Those who use its repositories will want to keep that in mind.

It's a little hard to decide what to think of Churaev's role here. The situation is, in some ways, akin to companies that have vulnerabilities reported to them, but fail to take any action. In the past, that has led some to forgo the "responsible disclosure" path and simply to publicly report any bugs found. That is essentially what Churaev has done here—more or less, anyway. Will it lead to changes in the distribution of RPM Fusion's keys (at least)? It's an open question that is now at least more prominent than it had been ...

Index entries for this article
SecurityBug reporting
SecurityDistribution security


to post comments

RPM Fusion, wiki defacement, and bug reporting

Posted Jul 31, 2014 7:58 UTC (Thu) by shalem (subscriber, #4062) [Link] (4 responses)

The biggest problem rpmfusion has atm is manpower, esp. at the infrastructure / sys-admin side of things. If anyone wants to help out and become a sysadmin (and has a proven track record in FOSS) I'm sure help would be very much appreciated.

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 2, 2014 23:39 UTC (Sat) by Tara_Li (guest, #26706) [Link]

Sure - but I thought most Wikis had a way to lock certain pages to block editing, and ones with particularly critical information, such as pointers to the GPG keys and the repo URLs would be high on the list of those that I would have blocked for editing in the first days of the project.

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 4, 2014 5:21 UTC (Mon) by jdieter (subscriber, #42216) [Link] (1 responses)

Well, seeing as I'm already in the middle of all this, I'm volunteering. See https://lists.rpmfusion.org/pipermail/rpmfusion-developer...

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 4, 2014 7:26 UTC (Mon) by shalem (subscriber, #4062) [Link]

Awesome! Thanks for volunteering.

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 9, 2014 5:23 UTC (Sat) by fn77 (guest, #74068) [Link]

I'm interested too, but just opening this site:

https://lists.rpmfusion.org/

I get a SSL error:

[...]
You attempted to reach lists.rpmfusion.org, but the server presented a certificate issued by an entity that is not trusted by your computer's operating system. This may...
[...]

Whatever, got subscribed on sysadmin and the confirmation email went on the spam bin at gmail. Confirmed that, other steps for me to follow?

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 3, 2014 21:56 UTC (Sun) by marcH (subscriber, #57642) [Link] (2 responses)

> If you actually want to *fix* the problem, then suggest some concrete solutions.

Like for instance... publishing public keys and other critical information anywhere but on a completely insecure wiki? The most basic (and free) Google doc looks far more secure than this. It does not look like the wiki page should have been reverted, it should rather have been deleted!

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 11, 2014 23:36 UTC (Mon) by derekp7 (guest, #98286) [Link] (1 responses)

But that doesn't keep someone from creating a new wiki page (or adding to any other plausible public page) false installation instructions.

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 12, 2014 8:24 UTC (Tue) by marcH (subscriber, #57642) [Link]

I think there is some difference between "official" and "plausible public". At least *I* usually make such a difference!

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 4, 2014 2:08 UTC (Mon) by sitaram (guest, #5959) [Link] (7 responses)

Considering the history of ignored issues, I'm totally on Churaev's side on this.

As for the comment that rpmfusion lacks manpower, that is common everywhere. They need to prioritise. I have no idea what *else* they do, and I am sure it is a lot, but this kind of issue must come first, even if the latest update to vlc (to use a totally not-random example) is a little delayed.

As of August 2nd, there appear to be some "ACLs" added. It would be interesting to know how much effort this was, and if not much, why it was not done as soon as Churaev first "defaced" the page.

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 4, 2014 6:26 UTC (Mon) by marcH (subscriber, #57642) [Link] (6 responses)

> They need to prioritise. I have no idea what *else* they do, and I am sure it is a lot, but this kind of issue must come first,

... and one effective way to prioritize is NOT to do something quick/dirty/insecure/short-sighted/etc. In this example, it's most likely that someone will volunteer to implement something correctly if this important information is not published anywhere. As it stands almost everyone (but Churaev) must believe that the wiki is either secure or "insecure by design".

I find that the "short on manpower" (and very valid) argument is never good enough to justify doing something very quick and dirty and damaging - of course unless you are *paid* to do it by some mad deadline.

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 4, 2014 6:32 UTC (Mon) by sitaram (guest, #5959) [Link] (5 responses)

normally, you'd be right, but I'm also considering the example in the original article where something has been around since 2012 and not fixed.

That is what I meant when I said "Considering the history of ignored issues". Clearly your rationale doesn't apply, and that if you leave it to the "don't do anything rash" camp it just devolves to "don't do anything".

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 5, 2014 7:51 UTC (Tue) by marcH (subscriber, #57642) [Link] (4 responses)

> ... where something has been around since 2012 and not fixed. That is what I meant when I said "Considering the history of ignored issues".

I don't think you understood me: I suggested to *delete* this information from the insecure and hackable wiki. Strip the several years old band-aid.
That should be painful enough to attract attention.

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 5, 2014 9:21 UTC (Tue) by sitaram (guest, #5959) [Link] (3 responses)

You're right I misunderstood what you said

But deletions can be reverted just as easily as changes to text, so I'm not sure if the end result would be any different than what it is now.

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 9, 2014 5:27 UTC (Sat) by fn77 (guest, #74068) [Link]

Then can I suggest putting a big red warning on the main page?

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 9, 2014 20:39 UTC (Sat) by mathstuf (subscriber, #69389) [Link] (1 responses)

I think what is being discussed here is deletion from the database, not just the current revision.

RPM Fusion, wiki defacement, and bug reporting

Posted Aug 10, 2014 1:09 UTC (Sun) by mathstuf (subscriber, #69389) [Link]

Oops, didn't check the context; thought this was in reference to the EU's "right" to be forgotten stuff and Wikipedia.


Copyright © 2014, Eklektix, Inc.
This article may be redistributed under the terms of the Creative Commons CC BY-SA 4.0 license
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds