Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Combining a cross-site scripting (XSS) vulnerability with a TinyURL redirect, hackers successfully broke into the infrastructure for the open-source Apache Foundation in what is being described as a "direct, targeted attack."
The hackers hit the server hosting the software that Apache.org uses to it to track issues and requests and stole passwords from all users. The software was hosted on brutus.apache.org, a machine running Ubuntu Linux 8.04 LTS, the group said.
The passwords were encrypted on the compromised servers (SHA-512 hash) but Apache said the risk to simple passwords based on dictionary words "is quite high" and urged users to immediately rotate their passwords. "In addition, if you logged into the Apache JIRA instance between April 6th and April 9th, you should consider the password as compromised, because the attackers changed the login form to log them," Apache said.
Things like this are also a prime reason to never use the same password on two websites. Use a password safe people, unique complex passwords for every site.
(Keepass is pretty full featured if you're unfamiliar with with password safes)
SELinux in this case would have prevented nothing so far as i can see by reading the actual account. I'm interested in see your explanation of what it would have prevented and how.
SELinux in this case would have prevented nothing so far as i can see by reading the actual account. I'm interested in see your explanation of what it would have prevented and how.
Since sarajevo has not responded and since you are likely to have more knowledge of SE Linux compared to him, maybe could you come up with one example of where SE Linux could have helped if it were enabled and running in the standard "targeted" configuration? If you would be willing to (thanks!) then to make it easier let's assert the JIRA admin account they gained access to does not equal a root account.
There are areas that SE Linux could have helped. To apply that to this case however requires a lot of ifs and buts because the case shows some errors. This type of error no software can hope to defend against (human errors I mean).
This type of error no software can hope to defend against (human errors I mean).
That about sums it up. There are instances where both selinux and apparmor could prevent additional exploits (although reading the article didn't indicate that this particular breach would be one of those), but it can't save you from yourself. No admin is perfect, but having all the security fronts covered that you can reduces the probability of a catastrophic system compromise and sometimes enable you to find a potential security issue before an external entity does.
There are instances where both selinux and apparmor could prevent additional exploits
I wasn't thinking of additional exploits but actual parts of the breach process. Now I don't like guesswork or assumptions as a foundation for explaining things but if I strain myself and assert that 0) JIRA admin does not equal root and 1) daemon processes run in the JIRA context, then there's at least three points I can think of right now:
- changing the upload attachment path (right after bruting login.jsp got them JIRA admin access) wouldn't allow access outside of the JIRA context,
- browsing the file system (after uploading the JSP filesystem browser) wouldn't be possible outside of the JIRA context,
- running the JSP backdoor wouldn't be allowed to bind to a port that isn't in the allowed list of ports for the JIRA context.
It's hypothetical, minor fersure and maybe insignificant as well and it could only have slowed down progress if they didn't have a backup plan and tools in place but at least I came up with something instead of elaborating on the human error part which aspect I already did cover.
I was reading this article recently that found human error or the human factor to be the weakest link in any security scheme. You can have all the technology you want to try to secure yourself, but if you don't know what you're doing or how to use it, it won't do you much good. This actually applies to numerous fields, even medicine, engineering, etc. The most sophisticated technology can't make up for human stupidity or carelessness or lack of understanding.
- changing the upload attachment path (right after bruting login.jsp got them JIRA admin access) wouldn't allow access outside of the JIRA context,
- browsing the file system (after uploading the JSP filesystem browser) wouldn't be possible outside of the JIRA context,
- running the JSP backdoor wouldn't be allowed to bind to a port that isn't in the allowed list of ports for the JIRA context.
Nice explanation. Thanks.
When I wrote above that SeLinux could help to prevent more damage, I thought in case there was ( ??? ) selinux enabled on system, it would prevent compromised user ( JIRA admin ) to read files at rest of system ( unless JIRA admin==root )
But all this unSpawn already wrote above.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.