LWN: Comments on "Lessons from the Debian compromise" https://lwn.net/Articles/62517/ This is a special feed containing comments posted to the individual LWN article titled "Lessons from the Debian compromise". en-us Fri, 10 Oct 2025 01:21:15 +0000 Fri, 10 Oct 2025 01:21:15 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Lessons from the Debian compromise https://lwn.net/Articles/63908/ https://lwn.net/Articles/63908/ helgehaf There's no need to schedule downtime for this.<p>Take advantage of the fact that a scsi disk is accessible from several machines at once (by connecting two host adapters.)<p>The disk that is &quot;main disk&quot; for one machine is mounted read-only for checking by another machine. The other machine always boot cleanly because<br>it boots from a unwriteable cdrom. It can tell if something bad happens to files on the &quot;shared&quot; disk. Fri, 19 Dec 2003 16:48:45 +0000 How do you figure?? https://lwn.net/Articles/63004/ https://lwn.net/Articles/63004/ RobSeace How on Earth can you say that someone gaining access to a legit developer's<br>user account is &quot;a small deal&quot;???? And, at the same time, that going from<br>there to root is a &quot;a big deal&quot;???? I can't comprehend your perspective...<p>By having access to the developer's user account, the attacker can pretend<br>to be the developer, including doing such things as checking in code under<br>his/her name, communicating with others to obtain info intented only for the<br>developer, and basically anything and everything that legit developer could<br>do... Is this really &quot;a small deal&quot; to you???? Do you realize the damage<br>that could be done this way?? Think about it... Chances are, no one would<br>ever have found out about such a user-only attack: no system files would<br>have changed, no kernel oopses as warnings, nothing to tip anyone off that<br>anything was up... So, this person could have undected access for as long<br>as they wanted, and do anything they wanted in the real developer's name,<br>without arousing anyone's suspicions... They could get a hidden backdoor of<br>some sort worked into some major bit of software which they know will be<br>run by everyone that uses the distro, and as soon as it gets distributed<br>widely, they'd have access to thousands of machines around the world, with<br>no one being the wiser (until they eventually slip up and get caught)...<br>You don't think this represents a scary scenario?? Yet, you find the mere<br>escalation from an authorized remote user account to root the end of the<br>world???? I'm totally baffled by that...<p>Gaining root, when you already have the above power, is just unecessary<br>overkill, really... If the person who pulled this off were smart, they<br>would've done as I describe above, and stayed hidden, and been able to do<br>lots of nasty things for a LONG time, before anyone ever caught them...<br>By being greedy and going after root, they got caught quickly... And, what<br>did it gain them?? Not much... Seriously, tell me: what are you so afraid<br>they could've done as root, that they couldn't have accomplished far more<br>stealthfully as the developer?? It seems to me the big danger is planting<br>some kind of back-door/trojan into the source, right? Why do that with<br>noisy root access, when you can do it with stealthy developer access, and<br>arouse no one's suspicions?? Sure, as root they can sniff everyone's<br>passwords and monitor everyone's communications, etc... But, so what?<br>What is the ultimate danger from doing that: that they'll be able to find a<br>way to poison the source code, right? Or, are you worried about some OTHER<br>danger that I'm not seeing?? Sat, 13 Dec 2003 19:49:49 +0000 hardening the kernel https://lwn.net/Articles/63001/ https://lwn.net/Articles/63001/ giraffedata <i>Some kind of self check of the kernel against a hash only readable and written once at boot maybe?</i> <p>Maybe, but that wouldn't be a lesson learned from this incident. The kernel wasn't modified. (The problem is that the cracker was able to read kernel memory). Sat, 13 Dec 2003 19:16:21 +0000 brk() bug was the real problem https://lwn.net/Articles/63000/ https://lwn.net/Articles/63000/ giraffedata I take the opposite view. An unauthorized user being able to log into a system as a nonprivileged user is a small deal. Being able to escalate to a privileged user is a big deal.<p>That's because there are all kinds of legitimate reasons for having a system that untrusted people can log into as an unprivileged user. We should not therefore squander our attention on stopping people from logging in, but rather allocate it to stopping privilege escalations.<br> Sat, 13 Dec 2003 19:05:11 +0000 Lessons from the Debian compromise: backups. https://lwn.net/Articles/62999/ https://lwn.net/Articles/62999/ giraffedata And more than one copy too. Most people keep one copy of everything, just as protection in case a disk breaks or gets suddenly wiped out. So your backup contains the cracked version of your files.<p>But what you really need to protect you from a crack, or various other forms of losses, is a multilevel rotation scheme. Have one copy from last night, but also a copy from each of the last 7 nights, and one copy from each of the last 7 weeks, and one copy from each of the last 49 weeks, etc.<p>That way, when you find out that someone put a backdoor in your system a few weeks ago, you can restore the original files (which probably hadn't changed for years before that).<br> Sat, 13 Dec 2003 18:57:24 +0000 Use grsecurity on critical machines! https://lwn.net/Articles/62918/ https://lwn.net/Articles/62918/ penguinroar I agree with the parent poster, its time to harden the kernel a bit to keep ahead of the crackers. I dont meen that bugs should be downplayed but to have both belt and straps is by my own opinion a good thing. There are several implementations of hardened kernels but i havent seen any broad use of them yet. <p>Intrusion detection is a harder nut to crack since a to vicious one will cry wolf to much. Some kind of self check of the kernel against a hash only readable and written once at boot maybe? Sat, 13 Dec 2003 07:58:04 +0000 Use grsecurity on critical machines! https://lwn.net/Articles/62853/ https://lwn.net/Articles/62853/ emk The grsecurity patch to the Linux kernel does two highly useful things:<p> 1) It breaks most exploits by heavily randomizing memory layouts, PIDs, and anything else it can find to randomize. It also makes quite a few things non-executable, even on Intel architectures.<p> 2) It optionally allows you to set up advanced role-based ACLs, which allow you to ruthlessly strip privileges away from various processes on your server. In particular, you can drop unneeded capabilities from root processes, prevent fork/exec of all but a specified list of executables, and hide all but a tiny part of the filesystem.<p>If you use grsecurity in addition to your regular system hardening, you can make life very difficult for the crackers. Fri, 12 Dec 2003 14:58:15 +0000 Lessons from the Debian compromise https://lwn.net/Articles/62753/ https://lwn.net/Articles/62753/ jordi Getting the services back involves auditing all the scripts that run the services. There are many services at debian.org, and there's a priority to get stuff fixed. The Debian admins are doing a good job, and the most critical services were restored quite quickly after the exploit was found. For example, the developers already have access to one of the most important boxes, and have their accounts unlocked in general, which means Debian's pulse, the packages stream, is already in movement once again. And yes, this means there are package updates. You should have been getting new packages for some days already. Maybe your mirror is stale... Thu, 11 Dec 2003 22:47:54 +0000 Lessons from the Debian compromise https://lwn.net/Articles/62750/ https://lwn.net/Articles/62750/ wolfrider This downtime is getting ridiculous though. packages.debian.org is STILL down as of this writing (Thu 2003-12-11) and nothing's coming thru apt-get upgrade.<p>When will things be back to &quot;normal&quot;?<br> Thu, 11 Dec 2003 22:02:37 +0000 Lessons from the Debian compromise: backups. https://lwn.net/Articles/62744/ https://lwn.net/Articles/62744/ doogie There are backups. Debian machines backup their critical config data to other backup machines.<p>Having backups does not mean compromises don't exist, and that when they do, they should just be ignored, and a backup deployed.<br> Thu, 11 Dec 2003 20:44:36 +0000 Lessons from the Debian compromise https://lwn.net/Articles/62743/ https://lwn.net/Articles/62743/ doogie &gt; It must be understood that up to this point the attack had not been<br>&gt; detected. The machines were penetrated and had been successfully subverted. <br>&gt; The attacks were executed in such a manner that none of the installed<br>&gt; security mechanisms caught the activity. So why didn't the archives get<br>&gt; compromised? And how was it that the attack, was even discovered?<p>This is not correct.<p>I was the one who had noticed one of the machines(master) kernel oopsing. We thought it might be hardware, so a quick reboot was done.<p>Soon after reboot, the oops continued.<p>Then, it was discovered that another machine(murphy) was also having oopsen. Additionally, a non-debian machine started having the same oops. At this time, other admins(I'm just a local admin for master and murphy) were checked, and the breakin was acknowledged.<p>As for the intrusion programs not detecting anything; they did. AIDE was installed on several machines, and did report file changes. However, one of the debian admins thought another had done a change, and he(the first) hadn't gotten around to asking the other about it yet.<p>Also, it's interesting to note that not all the infected machines were having kernel oopses. Thu, 11 Dec 2003 20:40:15 +0000 Too weak https://lwn.net/Articles/62669/ https://lwn.net/Articles/62669/ RobSeace &gt; &quot;Imagine there is an unknown, exploitable bug in the kernel's brk() <br>&gt; implementation. What *technical measures* (other than discovering + fixing <br>&gt; the bug) could prevent that problem from being exploited?&quot;<br>&gt; <br>&gt; Answer that, and this won't happen again.<p>Forbiding all remote user access would do it... But, may be too extreme<br>for many... ;-) People seem to forget, it's NOT the kernel brk() bug that's<br>ultimately to blame here, as I see it: that was just a local exploit, which<br>allowed the attacker to escalate their privs once they'd already broken into<br>a normal user account... The REAL problem is that they broke into a normal<br>user account, in the first place! Do you imagine the impact of that, even<br>without root access, to be a minor issue?? (I mean &quot;you&quot; in the generic<br>sense here, not attacking you personally...) If this person whose account<br>was compromised was a developer (and, if not, why do they have an account<br>on those machines??), then all an attacker would NEED is their normal user<br>access in order to plant trojan horses in any software the developer had<br>access to... Plus, by pretending to be that user, they could perhaps<br>social-engineer others into giving them enough info to do further damage,<br>elsewhere...<p>So, all this continued focus on the kernel brk() bug really bugs me... (No<br>pun intended... ;-)) It's completely missing the point to lay the blame<br>there, and give THAT all of the focus and attention... It would be much<br>more important to focus on how the person got access to that user's account<br>in the first place... THAT is what needs to be prevented in the future;<br>and, that's FAR more important, IMHO, than any local-only root exploit...<br>If no one untrusted has remote access, then all local exploits become<br>totally irrelevent... And, even in the case where there were no local<br>exploits at all, letting anyone untrusted have remote access to a legit<br>user's account is STILL a very, very BAD thing... So, as I say, I think<br>everyone is focusing on the wrong problem in this whole mess... ;-/ Thu, 11 Dec 2003 16:36:02 +0000 Lessons from the Debian compromise https://lwn.net/Articles/62619/ https://lwn.net/Articles/62619/ copsewood When I was involved in proving the existence of a then unknown M$ virus it<br>made sense to shut the system down and apply an integrity check on a static filesystem from a known clean boot environment. Doing this periodically will of course result in regular scheduled downtime. This may be a price which has to be paid for a more secure environment, unless those engaged in root-kit detection mechanisms can somehow guarantee the integrity of their check operating from within the compromised environment. As I don't realistically see any such guarantee as being realistic is 15-30 minutes downtime a day something we may need to accept for a higher integrity environment ? Thu, 11 Dec 2003 13:02:10 +0000 Too weak https://lwn.net/Articles/62616/ https://lwn.net/Articles/62616/ walles IMO this article was far too weak. &quot;Crackers can make bad code&quot; is not something you should rely on. I agree on the bio-diversity point. &quot;Good people make a difference&quot; might be true, but it is too weak. How do you get &quot;good people&quot; to run your system? Especially if you are a home user?<p>What should be learned from this is stuff that people can actually *do* something with. Like the bio-diversity, the attack was obviously somewhat contained by Debian using more than one hardware platform.<p>I think the real question that should be asked (I don't have the answer unforturnately) is:<p>&quot;Imagine there is an unknown, exploitable bug in the kernel's brk() implementation. What *technical measures* (other than discovering + fixing the bug) could prevent that problem from being exploited?&quot;<p>Answer that, and this won't happen again.<p>BTW, I haven't heard anything about the Stanford Checker lately, could something like that have found the bug in the first place? If so, that program should be run every time somebody checks something in into BK.<br> Thu, 11 Dec 2003 12:31:55 +0000 Lessons from the Debian compromise: backups. https://lwn.net/Articles/62591/ https://lwn.net/Articles/62591/ hensema So after the fire at Twente University and the recent crack, Debian still fails to learn the most important lesson: make backups!<p>It cannot be stressed enough how important this is. Backups are far more important than relying on the mistakes a cracker makes. Thu, 11 Dec 2003 11:32:23 +0000 Lessons from the Debian compromise https://lwn.net/Articles/62581/ https://lwn.net/Articles/62581/ climent The system administrators found some machines having kernel Oopses. That lead to the suspicion that something was happening. Thu, 11 Dec 2003 10:12:02 +0000 log checkers https://lwn.net/Articles/62545/ https://lwn.net/Articles/62545/ sweikart <pre>> Another crack imperfection was that it generated strange messages > in the log files which led to the attack's discovery. It turns out > that one of the system administrators became uneasy as he was > looking through the log files of one of his machines. Note that a simple log checking program might have resulted in much quicker detection. Unless the attacker was clever enough to disable outgoing mail (and then clean the logs). Then you would need remote logging (as available with syslog-ng), with the log checker running on the logging server (and the logging server needs to be the most secure server, e.g. only accessible to a few individuals who run very secure workstations). -scott </pre> Thu, 11 Dec 2003 03:39:56 +0000