Re: Improved Debian Project Emergency Communications (was Re: communication structures crumbled)

2003-11-29 Thread Martin Schulze
Karsten M. Self wrote:
> > It had to be re-installed.  You probably know that since you've read
> > the announcement we were able to send out before the machine was taken
> > down for reinstallation.
> 
> That announcement wasn't delivered for all users until _after_ murphy
> was resurrected.  I myself got the debian-security-announce message
> mailed Nov 21 on 25 Nov 2003 15:16:56 -0800.

That's true since murphy was powered down for a re-install in the middle
of its delivery.  The (same) mail on debian-announce should have been
delivered by that time.

Regards,

Joey

-- 
Have you ever noticed that "General Public Licence" contains the word "Pub"?



Re: Improved Debian Project Emergency Communications (was Re: communication structures crumbled)

2003-11-29 Thread Martin Schulze
Karsten M. Self wrote:
> > It had to be re-installed.  You probably know that since you've read
> > the announcement we were able to send out before the machine was taken
> > down for reinstallation.
> 
> That announcement wasn't delivered for all users until _after_ murphy
> was resurrected.  I myself got the debian-security-announce message
> mailed Nov 21 on 25 Nov 2003 15:16:56 -0800.

That's true since murphy was powered down for a re-install in the middle
of its delivery.  The (same) mail on debian-announce should have been
delivered by that time.

Regards,

Joey

-- 
Have you ever noticed that "General Public Licence" contains the word "Pub"?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Improved Debian Project Emergency Communications (was Re: communication structures crumbled)

2003-11-28 Thread Ross Boylan
On Fri, Nov 28, 2003 at 04:14:19AM -0800, Karsten M. Self wrote:
> I'll disagree with Martin's comment that the server compromise didn't
> constitute a security issue despite the lack of an archive compromise.
> For someone well versed in Debian procedures, it might have been
> plausible that the archives themselves weren't compromised.  For a
> typical user, I don't think this was the case.  For the typical user's
> management or clients, it's very likely _not_ the case, and a timely
> positive statement of status would be very, very helpful.
> 
> Security affecting Debian servers _potentially_ affects Debian packages.
> As it was, I cleared my locale package cache and stopped updates on
> hearing about the compromise.  It wasn't for another few hours that I
> was aware that the archive was reportedly _not_ compromised.
> 
> In the absense of any information, the security status of Debian project
> packages in the event of a known or rumored server compromise is at best
> unknown.

It wasn't clear to me that the packages that I had downloaded were
safe, and it even wasn't clear after reading that the archives were
safe.  I suggest some phrase like "packages in the debian archive" or
just "debian packages."

The reason is that "archive" usually means something covering
(ancient) history.  I initially thought it referred to the mailing
list archives.  If I'd thought harder, I might have thought it
referred to past debian packages (which I think are provided via
snapshot.debian.org?? I've never used them).

Perhaps I should have known better, but since the confusion seems
pretty easy, and pretty easy to fix, I suggest fixing it if we should
ever have such an unfortunate incident again.

Thanks to all those who worked so hard to detect, and then correct,
this problem.

Ross Boylan



Re: Improved Debian Project Emergency Communications (was Re: communication structures crumbled)

2003-11-28 Thread Ross Boylan
On Fri, Nov 28, 2003 at 04:14:19AM -0800, Karsten M. Self wrote:
> I'll disagree with Martin's comment that the server compromise didn't
> constitute a security issue despite the lack of an archive compromise.
> For someone well versed in Debian procedures, it might have been
> plausible that the archives themselves weren't compromised.  For a
> typical user, I don't think this was the case.  For the typical user's
> management or clients, it's very likely _not_ the case, and a timely
> positive statement of status would be very, very helpful.
> 
> Security affecting Debian servers _potentially_ affects Debian packages.
> As it was, I cleared my locale package cache and stopped updates on
> hearing about the compromise.  It wasn't for another few hours that I
> was aware that the archive was reportedly _not_ compromised.
> 
> In the absense of any information, the security status of Debian project
> packages in the event of a known or rumored server compromise is at best
> unknown.

It wasn't clear to me that the packages that I had downloaded were
safe, and it even wasn't clear after reading that the archives were
safe.  I suggest some phrase like "packages in the debian archive" or
just "debian packages."

The reason is that "archive" usually means something covering
(ancient) history.  I initially thought it referred to the mailing
list archives.  If I'd thought harder, I might have thought it
referred to past debian packages (which I think are provided via
snapshot.debian.org?? I've never used them).

Perhaps I should have known better, but since the confusion seems
pretty easy, and pretty easy to fix, I suggest fixing it if we should
ever have such an unfortunate incident again.

Thanks to all those who worked so hard to detect, and then correct,
this problem.

Ross Boylan


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Improved Debian Project Emergency Communications (was Re: communication structures crumbled)

2003-11-28 Thread Dale Amon
On Fri, Nov 28, 2003 at 01:52:14PM +0100, Kjetil Kjernsmo wrote:
> I learnt on /. that it had been a password compromise, so that meant, it 
> was in the generic class of problems. We're always vulnerable towards 
> that. But, we're all likely to be vulnerable to the local exploit used 
> to gain root. Besides, it was /. :-) 

>From the report I just read, sniffed password compromise
to get in... but an as yet unknown privilege escalation
from user to root once on board.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Improved Debian Project Emergency Communications (was Re: communication structures crumbled)

2003-11-28 Thread Dale Amon
On Fri, Nov 28, 2003 at 01:52:14PM +0100, Kjetil Kjernsmo wrote:
> I learnt on /. that it had been a password compromise, so that meant, it 
> was in the generic class of problems. We're always vulnerable towards 
> that. But, we're all likely to be vulnerable to the local exploit used 
> to gain root. Besides, it was /. :-) 

>From the report I just read, sniffed password compromise
to get in... but an as yet unknown privilege escalation
from user to root once on board.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Improved Debian Project Emergency Communications (was Re: communication structures crumbled)

2003-11-28 Thread Kjetil Kjernsmo
On Friday 28 November 2003 13:14, Karsten M. Self wrote:

>That announcement wasn't delivered for all users until _after_ murphy
>was resurrected.  I myself got the debian-security-announce message
>mailed Nov 21 on 25 Nov 2003 15:16:56 -0800.

Hm, I got that late too, but the (unsigned) announcement got to 
debian-announce before the takedown. 

> First I want to say that the Debian project, in extremely adverse
> circumnstances, comported itself well, disseminated information, if
> not fully effectively, well beyond its nominal capacity with both web
> and email services offline.  Disclosures were timely, informative,
> and helpful, while restraining themselves to established facts and
> working within constraints of an as yet ongoing investigation.   Very
> few organizations can claim as much.  Not only this, but it appears
> at this point that the crown jewels -- the Debian archives and
> mirrored distribution points themselves -- were _not_ compromised.
>  Commendable.

Absolutely!

> I'll disagree with Martin's comment that the server compromise didn't
> constitute a security issue despite the lack of an archive
> compromise. 

> Security affecting Debian servers _potentially_ affects Debian
> packages. 

Yes, and I think the point needs emphasis that even if the archives are 
not compromised, what has happened to the Debian servers is very 
relevant to the security of all Debian users.

My first thought when heared about the compromise was "ouch, that 
probably means, I'm vulnerable too". I considered for a moment to take 
my main server offline. The problem is of course that we all run the 
much of the same software that is on the Debian machines. Unless there 
are something generic that is a known problem (such as a sniffed 
password), or something that is special to one of the servers (e.g. 
BTS), the attacker might be able to use the attack he used on the 
Debian servers on pretty much _any_ Debian box. That's really scary. 

I learnt on /. that it had been a password compromise, so that meant, it 
was in the generic class of problems. We're always vulnerable towards 
that. But, we're all likely to be vulnerable to the local exploit used 
to gain root. Besides, it was /. :-) 

For these reasons, I think it is fair to say that any compromise on the 
Debian servers is very relevant to the security of all users. And that 
was the information I was missing earlier, to what extent I would 
myself be vulnerable. 

Also, I'm not a regular IRC user, so it didn't occur to me at the time 
that it was an alternative for gathering information. Besides, how is 
it with signatures on IRC? 

Best,

Kjetil
-- 
Kjetil Kjernsmo
Astrophysicist/IT Consultant/Skeptic/Ski-orienteer/Orienteer/Mountaineer
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED]
Homepage: http://www.kjetil.kjernsmo.net/OpenPGP KeyID: 6A6A0BBC



Improved Debian Project Emergency Communications (was Re: communication structures crumbled)

2003-11-28 Thread Karsten M. Self
on Wed, Nov 26, 2003 at 09:30:05AM +0100, Martin Schulze ([EMAIL PROTECTED]) 
wrote:
> Dan Jacobson wrote:
> > To us debian users, the most notable thing during this break in or
> > whatever episode, is how the communication structures crumbled.
> 
> It had to be re-installed.  You probably know that since you've read
> the announcement we were able to send out before the machine was taken
> down for reinstallation.

That announcement wasn't delivered for all users until _after_ murphy
was resurrected.  I myself got the debian-security-announce message
mailed Nov 21 on 25 Nov 2003 15:16:56 -0800.


> > debian-announce had one message on the 21st, five days ago, saying for
> > more information, see www.debian.org.
> 
> You'll find the same information linked on the front-page.  Since the
> web infrastructure was affected as well, but you already knew that
> since it was mentioned in the announcement, it was not that easy
> updating the web server.  However, after a day we finally managed to
> do that.
> 
> > Nothing special there, so I checked http://www.debian.org/security/,
> > same problem.
> 
> As you know http://www.debian.org/security/ if for security
> announcements regarding the packages Debian distributes.  It has
> nothing to do with the security on the Debian machines.  Hence, it's
> the wrong place.

First I want to say that the Debian project, in extremely adverse
circumnstances, comported itself well, disseminated information, if not
fully effectively, well beyond its nominal capacity with both web and
email services offline.  Disclosures were timely, informative, and
helpful, while restraining themselves to established facts and working
within constraints of an as yet ongoing investigation.   Very few
organizations can claim as much.  Not only this, but it appears at this
point that the crown jewels -- the Debian archives and mirrored
distribution points themselves -- were _not_ compromised.  Commendable.

Some bits could be improved, which is what I'm focusing on below.



I'll disagree with Martin's comment that the server compromise didn't
constitute a security issue despite the lack of an archive compromise.
For someone well versed in Debian procedures, it might have been
plausible that the archives themselves weren't compromised.  For a
typical user, I don't think this was the case.  For the typical user's
management or clients, it's very likely _not_ the case, and a timely
positive statement of status would be very, very helpful.

Security affecting Debian servers _potentially_ affects Debian packages.
As it was, I cleared my locale package cache and stopped updates on
hearing about the compromise.  It wasn't for another few hours that I
was aware that the archive was reportedly _not_ compromised.

In the absense of any information, the security status of Debian project
packages in the event of a known or rumored server compromise is at best
unknown.



Communications in an emergency sitation is paramount, and a number of
people clearly _didn't_ get informed through back channels.  I myself
was _on_ IRC as word started leaking out, and still wasn't fully certain
of what was going on or what to trust.  Wichert's website (which I only
learned was his the 27th!) was very helpful, as was the coverage
provided by Slashdot and elsewhere.

Discussion this with Manoj on IRC, my suggestion as summarized by him is
that Debian should have an emergency response plan, part of which is a
communications policy in the event a similar future compromise or
systems failure.  Specifically:


  - Triggering events.  There are thresholds below which notifications
needn't be triggered, and above which they very much should.
Suggested:  any event significantly affecting perceptions of
security of the Debian archives or servers.  Any outage of mail,
web, or archive services anticipated to last beyond  .  E.g.:  6-12 hours, across core servers (but not mirrors).
Any core server root compromise.  *Not* single-package issues.
Nuclear war or asteroid strike:  you're on your own.


  - Where to provide information.  Personal websites and news channels
served well, but an advance statement of "here's where you should
turn in the event of an emergency" would be useful.


  - What information to provide.  
  
Specifically, 

- the known (or unknown) status of archive or package compromise.
- diagnostic checks; and/or
- cleanup procedures.  

Wichert's pages on this would be a good template.  

By "known (or unkown)", I mean:  if the archives are reasonably
known to be safe, or are known to be compromised, this is
communicated.  If an assessment cannot be made with confidence,
_that_ fact should be stated, e.g.:  "the current security of the
archives is unknown".  

By diagnostics and cleanup:  pointers to tools or documentation
explaining how to assess and/or secure a system.  Wipe and rebuild
if necessary.  Again, wiggy.net

Re: Improved Debian Project Emergency Communications (was Re: communication structures crumbled)

2003-11-28 Thread Kjetil Kjernsmo
On Friday 28 November 2003 13:14, Karsten M. Self wrote:

>That announcement wasn't delivered for all users until _after_ murphy
>was resurrected.  I myself got the debian-security-announce message
>mailed Nov 21 on 25 Nov 2003 15:16:56 -0800.

Hm, I got that late too, but the (unsigned) announcement got to 
debian-announce before the takedown. 

> First I want to say that the Debian project, in extremely adverse
> circumnstances, comported itself well, disseminated information, if
> not fully effectively, well beyond its nominal capacity with both web
> and email services offline.  Disclosures were timely, informative,
> and helpful, while restraining themselves to established facts and
> working within constraints of an as yet ongoing investigation.   Very
> few organizations can claim as much.  Not only this, but it appears
> at this point that the crown jewels -- the Debian archives and
> mirrored distribution points themselves -- were _not_ compromised.
>  Commendable.

Absolutely!

> I'll disagree with Martin's comment that the server compromise didn't
> constitute a security issue despite the lack of an archive
> compromise. 

> Security affecting Debian servers _potentially_ affects Debian
> packages. 

Yes, and I think the point needs emphasis that even if the archives are 
not compromised, what has happened to the Debian servers is very 
relevant to the security of all Debian users.

My first thought when heared about the compromise was "ouch, that 
probably means, I'm vulnerable too". I considered for a moment to take 
my main server offline. The problem is of course that we all run the 
much of the same software that is on the Debian machines. Unless there 
are something generic that is a known problem (such as a sniffed 
password), or something that is special to one of the servers (e.g. 
BTS), the attacker might be able to use the attack he used on the 
Debian servers on pretty much _any_ Debian box. That's really scary. 

I learnt on /. that it had been a password compromise, so that meant, it 
was in the generic class of problems. We're always vulnerable towards 
that. But, we're all likely to be vulnerable to the local exploit used 
to gain root. Besides, it was /. :-) 

For these reasons, I think it is fair to say that any compromise on the 
Debian servers is very relevant to the security of all users. And that 
was the information I was missing earlier, to what extent I would 
myself be vulnerable. 

Also, I'm not a regular IRC user, so it didn't occur to me at the time 
that it was an alternative for gathering information. Besides, how is 
it with signatures on IRC? 

Best,

Kjetil
-- 
Kjetil Kjernsmo
Astrophysicist/IT Consultant/Skeptic/Ski-orienteer/Orienteer/Mountaineer
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED]
Homepage: http://www.kjetil.kjernsmo.net/OpenPGP KeyID: 6A6A0BBC


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Improved Debian Project Emergency Communications (was Re: communication structures crumbled)

2003-11-28 Thread Karsten M. Self
on Wed, Nov 26, 2003 at 09:30:05AM +0100, Martin Schulze ([EMAIL PROTECTED]) wrote:
> Dan Jacobson wrote:
> > To us debian users, the most notable thing during this break in or
> > whatever episode, is how the communication structures crumbled.
> 
> It had to be re-installed.  You probably know that since you've read
> the announcement we were able to send out before the machine was taken
> down for reinstallation.

That announcement wasn't delivered for all users until _after_ murphy
was resurrected.  I myself got the debian-security-announce message
mailed Nov 21 on 25 Nov 2003 15:16:56 -0800.


> > debian-announce had one message on the 21st, five days ago, saying for
> > more information, see www.debian.org.
> 
> You'll find the same information linked on the front-page.  Since the
> web infrastructure was affected as well, but you already knew that
> since it was mentioned in the announcement, it was not that easy
> updating the web server.  However, after a day we finally managed to
> do that.
> 
> > Nothing special there, so I checked http://www.debian.org/security/,
> > same problem.
> 
> As you know http://www.debian.org/security/ if for security
> announcements regarding the packages Debian distributes.  It has
> nothing to do with the security on the Debian machines.  Hence, it's
> the wrong place.

First I want to say that the Debian project, in extremely adverse
circumnstances, comported itself well, disseminated information, if not
fully effectively, well beyond its nominal capacity with both web and
email services offline.  Disclosures were timely, informative, and
helpful, while restraining themselves to established facts and working
within constraints of an as yet ongoing investigation.   Very few
organizations can claim as much.  Not only this, but it appears at this
point that the crown jewels -- the Debian archives and mirrored
distribution points themselves -- were _not_ compromised.  Commendable.

Some bits could be improved, which is what I'm focusing on below.



I'll disagree with Martin's comment that the server compromise didn't
constitute a security issue despite the lack of an archive compromise.
For someone well versed in Debian procedures, it might have been
plausible that the archives themselves weren't compromised.  For a
typical user, I don't think this was the case.  For the typical user's
management or clients, it's very likely _not_ the case, and a timely
positive statement of status would be very, very helpful.

Security affecting Debian servers _potentially_ affects Debian packages.
As it was, I cleared my locale package cache and stopped updates on
hearing about the compromise.  It wasn't for another few hours that I
was aware that the archive was reportedly _not_ compromised.

In the absense of any information, the security status of Debian project
packages in the event of a known or rumored server compromise is at best
unknown.



Communications in an emergency sitation is paramount, and a number of
people clearly _didn't_ get informed through back channels.  I myself
was _on_ IRC as word started leaking out, and still wasn't fully certain
of what was going on or what to trust.  Wichert's website (which I only
learned was his the 27th!) was very helpful, as was the coverage
provided by Slashdot and elsewhere.

Discussion this with Manoj on IRC, my suggestion as summarized by him is
that Debian should have an emergency response plan, part of which is a
communications policy in the event a similar future compromise or
systems failure.  Specifically:


  - Triggering events.  There are thresholds below which notifications
needn't be triggered, and above which they very much should.
Suggested:  any event significantly affecting perceptions of
security of the Debian archives or servers.  Any outage of mail,
web, or archive services anticipated to last beyond  .  E.g.:  6-12 hours, across core servers (but not mirrors).
Any core server root compromise.  *Not* single-package issues.
Nuclear war or asteroid strike:  you're on your own.


  - Where to provide information.  Personal websites and news channels
served well, but an advance statement of "here's where you should
turn in the event of an emergency" would be useful.


  - What information to provide.  
  
Specifically, 

- the known (or unknown) status of archive or package compromise.
- diagnostic checks; and/or
- cleanup procedures.  

Wichert's pages on this would be a good template.  

By "known (or unkown)", I mean:  if the archives are reasonably
known to be safe, or are known to be compromised, this is
communicated.  If an assessment cannot be made with confidence,
_that_ fact should be stated, e.g.:  "the current security of the
archives is unknown".  

By diagnostics and cleanup:  pointers to tools or documentation
explaining how to assess and/or secure a system.  Wipe and rebuild
if necessary.  Again, wiggy.net