On Fri, Jun 2, 2017 at 11:25 AM, Ian Hinder <ian.hin...@aei.mpg.de> wrote:

> Hi all,
> 
> The security team at NCSA have blocked access to the ET Jenkins server due to 
> a suspected security compromise.  We are investigating.
> 
> If you have in the past configured a jenkins build node which can be accessed 
> from the jenkins master via ssh (i.e. you have added the jenkins public ssh 
> key to an authorized_keys file), then you should immediately remove this key. 
>  
> 
> Note that none of the jenkins build nodes apart from the one also hosted at 
> NCSA was working at the time, so it's unlikely that any further attack was 
> possible to those machines.
> 
> We have backups from before the incident, so assuming we can fix the 
> vulnerability, we should be able to get the system up and running in a few 
> days.

Hi,

A quick update:

I have recreated the Jenkins master and build nodes from backups, and have the 
new machines running. I am still waiting to hear from the NCSA security team 
concerning exactly what the vulnerability was.  I can't make Jenkins available 
publicly until we are confident that the vulnerability is not still exposed.

The same 5 tests that had been failing before are still failing, but I don't 
see any failures in McLachlan.

 GRHydro.GRHydro_test_shock_weno/1procs 
 GRHydro.GRHydro_test_shock_weno/2procs 
 SphericalHarmonicRecon.regression_test/2procs  
 SphericalHarmonicReconGen.SpEC-dat-test/2procs 
 SphericalHarmonicReconGen.SpEC-h5-test/2procs

-- 
Ian Hinder
http://members.aei.mpg.de/ianhin

_______________________________________________
Users mailing list
Users@einsteintoolkit.org
http://lists.einsteintoolkit.org/mailman/listinfo/users

Reply via email to