Re: The possibility of malicious code in the Debian unstable libtool-1.5 package

2003-08-26 Thread Noah L. Meyerhans
On Tue, Aug 26, 2003 at 08:23:44AM -0700, Alan W. Irwin wrote:
> Thus, wouldn't it be the right thing to do to withdraw the Debian unstable
> libtool-1.5 package until GNU has a chance to check the tarball? (And of
> course after the checked version is available, the tarball used to create
> the current package should be checked against it to make sure nothing
> malicious got propagated while the libtool-1.5 package was available).

Would it not be the right thing to simply run diff between the source in
testing (assuming that predates the crack) and the one in unstable and
look for suspicious code?  It doesn't take somebody operating in an
official GNU capacity to confirm that there's no malicious code there.

noah



pgp0.pgp
Description: PGP signature


Re: The possibility of malicious code in the Debian unstable libtool-1.5 package

2003-08-26 Thread Alan W. Irwin
On 26 Aug 2003, Scott James Remnant wrote:

> My tracking of the libtool 1.5 branch of CVS predates the compromise,
> trust me, there's no naughty code in there.

Thanks for that strong public reassurance and the useful discussion that
preceded it.

Alan
__
Alan W. Irwin
email: [EMAIL PROTECTED]
phone: 250-727-2902

Astronomical research affiliation with Department of Physics and Astronomy,
University of Victoria (astrowww.phys.uvic.ca).

Programming affiliations with the PLplot scientific plotting software
package (plplot.org), the Yorick front-end to PLplot (yplot.sf.net), the
Loads of Linux Links project (loll.sf.net), and the Linux Brochure Project
(lbproject.sf.net).
__

Linux-powered Science
__



Re: The possibility of malicious code in the Debian unstable libtool-1.5 package

2003-08-26 Thread Scott James Remnant
On Tue, 2003-08-26 at 17:38, Alan W. Irwin wrote:

> On 26 Aug 2003, Scott James Remnant wrote:
> 
> > The Debian package is actually Libtool 1.5.0a and is taken from their
> > CVS repository, which wasn't compromised.
> >
> 
> I agree it takes extreme care to leave no tracks behind so it is fairly
> improbable that the cvs server was compromised. And even if an undetected
> crack occurred of that server, I agree it would take some effort to rewrite
> RCS files (although temporarily putting in a maliciously modified cvs server
> could do it).  Thus, I agree with your judgement that restoring from cvs is
> safe to a fairly large degree. However, GNU have apparently decided not to
> restore from cvs since otherwise they should be able to proceed at a much
> faster rate than 10-15 restorations per day.  Shouldn't debian follow their
> lead and be ultra-cautious also (especially with libtool since the downside
> is so severe if that app is compromised)?
> 
My tracking of the libtool 1.5 branch of CVS predates the compromise,
trust me, there's no naughty code in there.

Scott
-- 
Have you ever, ever felt like this?
Had strange things happen?  Are you going round the twist?


signature.asc
Description: This is a digitally signed message part


Re: The possibility of malicious code in the Debian unstable libtool-1.5 package

2003-08-26 Thread Alan W. Irwin
On 26 Aug 2003, Scott James Remnant wrote:

> The Debian package is actually Libtool 1.5.0a and is taken from their
> CVS repository, which wasn't compromised.
>
> The _orig.tar.gz *is* the potentially compromised one from the FTP site,
> however any compromise would be reverted back to the uncompromised CVS
> version by the .diff.gz[0]
>
> That aside, I've compared libtool-1.5.tar.gz to a checkout of the GNU
> CVS tree for that release, and there's no differences...  as well as
> obviously manually reading the 1.5 -> 1.5.0a diff before applying it.
>
> Unless cvs.gnu.org was also compromised by someone insane enough to
> rewrite RCS files by hand to hide the modification, libtool in unstable
> is safe :-)

I agree it takes extreme care to leave no tracks behind so it is fairly
improbable that the cvs server was compromised. And even if an undetected
crack occurred of that server, I agree it would take some effort to rewrite
RCS files (although temporarily putting in a maliciously modified cvs server
could do it).  Thus, I agree with your judgement that restoring from cvs is
safe to a fairly large degree. However, GNU have apparently decided not to
restore from cvs since otherwise they should be able to proceed at a much
faster rate than 10-15 restorations per day.  Shouldn't debian follow their
lead and be ultra-cautious also (especially with libtool since the downside
is so severe if that app is compromised)?

Alan
__
Alan W. Irwin
email: [EMAIL PROTECTED]
phone: 250-727-2902

Astronomical research affiliation with Department of Physics and Astronomy,
University of Victoria (astrowww.phys.uvic.ca).

Programming affiliations with the PLplot scientific plotting software
package (plplot.org), the Yorick front-end to PLplot (yplot.sf.net), the
Loads of Linux Links project (loll.sf.net), and the Linux Brochure Project
(lbproject.sf.net).
__

Linux-powered Science
__



Re: The possibility of malicious code in the Debian unstable libtool-1.5 package

2003-08-26 Thread Scott James Remnant
On Tue, 2003-08-26 at 16:23, Alan W. Irwin wrote:

> As I am sure most of you on this list are aware, GNU recently discovered
> that their ftp file server was owned for many months by a cracker.
> 
Indeed, I was the one who did a bulk-check of the easy MD5 sums and
posted it to the list :-)

> libtool-1.5.tar.gz is one of those tarballs that has not yet been given a
> clean bill of health by GNU (see http://ftp.gnu.org/gnu/libtool/).
> Nevertheless, it has been packaged for debian unstable. 
> 
Untrue.

The Debian package is actually Libtool 1.5.0a and is taken from their
CVS repository, which wasn't compromised.

The _orig.tar.gz *is* the potentially compromised one from the FTP site,
however any compromise would be reverted back to the uncompromised CVS
version by the .diff.gz[0]

That aside, I've compared libtool-1.5.tar.gz to a checkout of the GNU
CVS tree for that release, and there's no differences...  as well as
obviously manually reading the 1.5 -> 1.5.0a diff before applying it.

Unless cvs.gnu.org was also compromised by someone insane enough to
rewrite RCS files by hand to hide the modification, libtool in unstable
is safe :-)

Scott

[0] which also accidentally contains some .svn trees, oops! :)
-- 
Have you ever, ever felt like this?
Had strange things happen?  Are you going round the twist?


signature.asc
Description: This is a digitally signed message part


Re: The possibility of malicious code in the Debian unstable libtool-1.5 package

2003-08-26 Thread Noah L. Meyerhans
On Tue, Aug 26, 2003 at 08:23:44AM -0700, Alan W. Irwin wrote:
> Thus, wouldn't it be the right thing to do to withdraw the Debian unstable
> libtool-1.5 package until GNU has a chance to check the tarball? (And of
> course after the checked version is available, the tarball used to create
> the current package should be checked against it to make sure nothing
> malicious got propagated while the libtool-1.5 package was available).

Would it not be the right thing to simply run diff between the source in
testing (assuming that predates the crack) and the one in unstable and
look for suspicious code?  It doesn't take somebody operating in an
official GNU capacity to confirm that there's no malicious code there.

noah



pgpwhJqV4WpGy.pgp
Description: PGP signature


The possibility of malicious code in the Debian unstable libtool-1.5 package

2003-08-26 Thread Alan W. Irwin
As I am sure most of you on this list are aware, GNU recently discovered
that their ftp file server was owned for many months by a cracker.  They
rightly withdrew all their many source tarballs to check for malicious code.
The old tarballs were quickly reinstated (presumably because they had
backups from prior to when the cracker owned them) and also found to be free
of malicious code.  There are still some 500 of these newer tarballs for GNU
to check and apparently they are doing it at a rate of 10-15 per day.

libtool-1.5.tar.gz is one of those tarballs that has not yet been given a
clean bill of health by GNU (see http://ftp.gnu.org/gnu/libtool/).
Nevertheless, it has been packaged for debian unstable.  There is some room
for optimism that the tarball used to create that package does not have
malicious code in it (since the older tarballs that have been checked do
seem to be clean), but the cracker did have full control when that tarball
was created and for many months afterward, and the downside (many Debian
packages compromised that are built with libtool-1.5) could be severe indeed.

Thus, wouldn't it be the right thing to do to withdraw the Debian unstable
libtool-1.5 package until GNU has a chance to check the tarball? (And of
course after the checked version is available, the tarball used to create
the current package should be checked against it to make sure nothing
malicious got propagated while the libtool-1.5 package was available).

Note, I run debian stable myself, and I only happened to notice this
possible libtool-1.5 security problem for Debian unstable by chance.  Since
there doesn't seem to be any discussion of this issue on this list (and no
libtool bug reports about this issue) I thought I had better bring it up
for discussion.

Alan W. Irwin
__
Alan W. Irwin
email: [EMAIL PROTECTED]
phone: 250-727-2902

Astronomical research affiliation with Department of Physics and Astronomy,
University of Victoria (astrowww.phys.uvic.ca).

Programming affiliations with the PLplot scientific plotting software
package (plplot.org), the Yorick front-end to PLplot (yplot.sf.net), the
Loads of Linux Links project (loll.sf.net), and the Linux Brochure Project
(lbproject.sf.net).
__

Linux-powered Science
__