|
Message-ID: <20100120123142.GI14634@ngolde.de>
Date: Wed, 20 Jan 2010 13:31:42 +0100
From: Nico Golde <oss-security+ml@...lde.de>
To: oss-security@...ts.openwall.com
Subject: Re: BerliOS.de comrpomise
Hi,
* Josh Bressers <bressers@...hat.com> [2010-01-18 22:16]:
> As some of you have heard, it seems that BerliOS was compromised recently.
> http://lwn.net/Articles/369633/
> http://www.h-online.com/open/news/item/BerliOS-open-source-project-portal-falls-victim-to-attack-903990.html
>
> I've mailed the BerliOS admins with no reply. I'm wondering if anyone has
> any additional details regarding this.
>
> The Apache group had a similar incident some years back, and did an
> incredible job of documenting things:
> http://www.apache.org/info/20010519-hack.html
We (Debian) also contacted them and got a rather distracting reply so far
which doesn't help much. We are thinking about informing our maintainers to
check the upstream tarballs. But given the replies in the lwn thread and a
look at git.berlios.de doesn't give the impression so far that anything has
been fixed in a secure manner. I'll keep you updated but so far at least (and
this is my personal opinion) it doesn't look to me like it would be a wise
decision to host files at BerliOS currently and that BerliOS is interested to
do what apache has been done.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - nion@...ber.ccc.de - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.