LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 02-18-2015, 04:07 AM   #1
TopSpace
LQ Newbie
 
Registered: Feb 2015
Posts: 13

Rep: Reputation: Disabled
What ways could compromise Ubuntu?


Using 14.04 fresh-updated Ubuntu for home PC. I guess I got backdoor and Im trying to find out how its possible.
I do not downloaded side apps. Using Ubuntu for browsing most all of the time.
So I have 2 version:
1) Compromised updated from Canonical (I know it sounds little paranoid but its possible?) 2) Im get backdoor after personal attack by substite my download queries on apps (from Muon Software Center or Updates) to stucked apps with backdoor on server/provider side or vpn-server side (im using vpn server from time to time).
I know its paranoid and Im not pro system guy, but I really want to know this. So my questions:

Is it possible?
What other ways I can got backdoor?


Please don't ask me why I think my system was compromised, lets think theoretically.



Also do I need to look out variant of bugged browser? Im asking because of root password...
 
Old 02-18-2015, 07:37 AM   #2
rtmistler
Moderator
 
Registered: Mar 2011
Location: USA
Distribution: MINT Debian, Angstrom, SUSE, Ubuntu, Debian
Posts: 9,882
Blog Entries: 13

Rep: Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930Reputation: 4930
It is OK to raise theoretical questions about the security of your distribution. Unfortunately your questions are not well organized. Shall I try and then let you clarify?
  1. You wonder if Canonical has some sort of built in way to spy on a Ubuntu system.
  2. You wonder if general web engagement by your computer can cause it to be compromised, and these concepts include: general browsing, performing updates, as well as applications using the web for status or reports to somewhere.
  3. You generally wonder if the first two are possible and also what other possibilities exist.
  4. Your final query is confusing and raises the topic of a bugged browser. Not understanding whether that means bugged as in surveillance, or bugged as in software bug.

For (1) Canonical has some built in ways to get reporting of what you do with Ubuntu, the impressions they foment are that this all has to do with the improvement of the product as a whole. You can determine what level of concern you have with that versus not. And these are the known things, you can find information about this on the web using general web searches. If there are things more well hidden, I'm sure it's possible and not beyond the scruples of companies, but in general when things become big, like Windows if they "hide" this stuff and then it comes out later that they did this, it's pretty bad PR. That all being said, and without looking it all up, I'd wonder how much it would matter versus not for something which is free. The only real way to deal with this concern is to not use it, right?

For (2) if you use Google, you probably already know that they use the cookies and all other stuff involved to determine your web browsing/searching trends and provide ads to your customized per your actions. Whether or not they have other intentions or share that information, .... well that's all couched in the legalese which you can read and I never do. There are threads about what web search facilities people use and in those threads many of them also discuss the privacy issues related to the various search engines; of which I think bing and google get some of the worst criticisms.

For (3) there are a whole variety of things which could expose your system. Some things to try are from another computer, see if you can "see" your Ubuntu system on the network, see if you can ssh to it using root with no password, see if you can ftp to it as anonymous, try some stuff like that. Read some of the network security for Unix books to learn ways invaders would crack into a system and see just how exposed versus not the distribution is. Read The Cuckoo's Egg and other similar books, definitely read other ones because the concepts in The Cuckoo's Egg are very old, like serial terminal/modem old, but still interesting. And almost ALL of the network stuff is still around today, ftp, tftp, telnet, ping, and etc.

For (4) sorry you'll have to clarify. If you're really paranoid about a "bugged browser" there's little ... "DON'T CLICK THERE!!!!" Sorry you were about to allow a dangerous script by clicking OK and that's just a bad idea .... I mean "FORGET about what I said!" "There's NO SUCH THING as a bugged browser!" "Statistical IMPOSSIBILITY!"
 
Old 02-18-2015, 08:35 AM   #3
cepheus11
Member
 
Registered: Nov 2010
Location: Germany
Distribution: Gentoo
Posts: 286

Rep: Reputation: 91
Quote:
Originally Posted by TopSpace View Post
1) Compromised updated from Canonical (I know it sounds little paranoid but its possible?)
If someone at canonical behaves malicious, yes.

Quote:
2) ...by substite my download queries ... with backdoor
Ubuntu digitally sign their packages - like all large distributions do (I sure hope all do). The installer checks the signature with a public key which got on your computer while you installed ubuntu (Or checksums are checked, and a file containing the checksums is itself signed, and the signature is checked). An attacker who wants to sneak modified packages onto your system would have to sign their modified packages, which they cannot do without ubuntu's private key. So as long as

1) Your install medium was clean

2) Ubuntu keeps their private package signing keys private

3) You do not tamper with your apt-get in a way which makes it forget the signature check

4) Noone finds a fundamental way to break the applied public-private-key signing technic

You should be reasonably safe.

I found this: https://help.ubuntu.com/community/SecureApt
 
Old 02-19-2015, 05:15 AM   #4
veerain
Senior Member
 
Registered: Mar 2005
Location: Earth bound to Helios
Distribution: Custom
Posts: 2,524

Rep: Reputation: 319Reputation: 319Reputation: 319Reputation: 319
Be it any distro/version old or latest it has security bugs. See past security alerts from news site and you would ask such questions a little less.

Well we can minimize loss or chance of intrusion by keeping system updated and following good security practices.

A old but still relevant article for Linux OS's: Security Howto. Get it from tldp.
 
Old 02-20-2015, 07:38 AM   #5
Ihatewindows522
Member
 
Registered: Oct 2014
Location: Fort Wayne
Distribution: Ubuntu 16.04 LTS
Posts: 616
Blog Entries: 2

Rep: Reputation: 166Reputation: 166
Found a big security hole in Ubuntu yesterday. Poking around in GRUB I went to Advanced options for Ubuntu and booted into recovery mode. From there, you can have root access and do whatever you wish from the command line!

You might also want to give this a read:
https://www.gnu.org/philosophy/ubuntu-spyware.html
 
Old 02-20-2015, 08:11 AM   #6
snowday
Senior Member
 
Registered: Feb 2009
Posts: 4,667

Rep: Reputation: 1411Reputation: 1411Reputation: 1411Reputation: 1411Reputation: 1411Reputation: 1411Reputation: 1411Reputation: 1411Reputation: 1411Reputation: 1411
Quote:
Originally Posted by Ihatewindows522 View Post
Found a big security hole in Ubuntu yesterday. Poking around in GRUB I went to Advanced options for Ubuntu and booted into recovery mode. From there, you can have root access and do whatever you wish from the command line!
This is not a "security hole" but rather a "recovery mode" allowing the system administrator to recover a broken system. In other words, it is a documented/intentional feature, not a bug you just discovered.
 
Old 02-20-2015, 11:07 AM   #7
veerain
Senior Member
 
Registered: Mar 2005
Location: Earth bound to Helios
Distribution: Custom
Posts: 2,524

Rep: Reputation: 319Reputation: 319Reputation: 319Reputation: 319
Quote:
Originally Posted by snowpine View Post
This is not a "security hole" but rather a "recovery mode" allowing the system administrator to recover a broken system. In other words, it is a documented/intentional feature, not a bug you just discovered.
It is a security hole if:

1) Letting people have physical access to your system

2) Let them access BIOS

3) Not setting a BIOS boot password

4) Allowing a boot loader to boot arbitrary programs.

Edited: Read security-howto

Last edited by veerain; 02-21-2015 at 08:06 AM.
 
Old 02-20-2015, 12:49 PM   #8
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,636

Rep: Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965
Quote:
Originally Posted by veerain View Post
It is a security hole if:

1) Letting people have physical access to your system
2) Let them access BIOS
3) Not setting a BIOS boot password
These first three have nothing to do with GRUB's rescue mode, and are security basics.
Quote:
4) Allowing a boot loader to boot arbitrary programs.
Care to give an example here, of how you'd load an 'arbitrary' program via GRUB?
Quote:
5) Read security-howto
So reading a security how-to is a security hole?
 
Old 02-20-2015, 01:40 PM   #9
John VV
LQ Muse
 
Registered: Aug 2005
Location: A2 area Mi.
Posts: 17,624

Rep: Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651
the BEST way is this
" PEBKAC "
 
Old 02-23-2015, 07:24 AM   #10
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by TopSpace View Post
Using 14.04 fresh-updated Ubuntu for home PC. I guess I got backdoor (..) Please don't ask me why I think my system was compromised, lets think theoretically.
As the same thread played out similarly elsewhere I assert the OP is not willing to supply useful information, participate or solve a (perceived) problem. Thread closed.
 
  


Closed Thread



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: 10 ways in which Ubuntu can improve Unity LXer Syndicated Linux News 0 06-14-2011 02:00 PM
What are the best ways to secure Ubuntu on a laptop? jd64 Linux - Newbie 3 06-13-2011 09:30 PM
LXer: 4 More Ways to Clean Up Your Ubuntu Machine LXer Syndicated Linux News 0 08-07-2010 03:33 AM
LXer: 15 Ways Nokia’s N900 Is Better Than Apple’s iPhone (and 5 ways it’s not) LXer Syndicated Linux News 0 11-14-2009 08:20 AM
LXer: 4 Ways to Create ISO Images in Ubuntu LXer Syndicated Linux News 0 04-01-2009 07:50 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:21 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration