Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
That's what I'm afraid of, and I tried to download it but it said the service was down which is why I'm wondering if it was safe of me to even go there and try either via wget or by internet browser.
Since I read about this security breach I examine the security level of my desktop. Actually I downloaded and compiled the latest kernel from kernel.org at 31.Aug.
Because its only my desktop with no important data on it (instead of reinstall) I started to read my logs from the network logging system.
Even if my kernel should be somehow tampered (with some hidden processes) I cannot find any suspicious traffic on network level.
So maybe this can show that the kernel source was not Tampered. (?)
I mean any malicious (modified) part of the kernel which should serve to take control or use my system somehow requires network activity.
Again, Open Source will prevail...because it's "all over the place" so a single attack will not make more that a (serious) dent.
By the way, it shows where we stand against the "other" one...if there is an attack, we dont cover up and pretend our noses bleed...
As a future note: let's all meditate on how to strengthen the "system" and what with (software, package signing, hashes, what have you)...and flush the ideas around to let them mature...
Hey, I just got wind of this because I needed to recompile a kernel...so...
git seems pretty resilient, so that may be the safe way to get the kernel source in the future. As can be seen from this example the local checksums weren't helpful.
Linux Security is a forum that deals with facts, not fiction. Conjecture, giving voice to vague ideas just don't belong. Please keep this thread factual and on topic.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.