Wider implications of the Red Hat breach

Red Hat's recent server breach isn't the first time that a Linux distribution has been targeted by attackers, but it could be one of the most important attacks in terms of the recovery and mitigation processes.

Beyond the direct problems associated with resolving the breaches and uncovering the extent of any damage, the costs associated with re-verifying all source code and rebuilding packages make this particular set of system breaches more costly than most others. Questions should be asked about why the package signing machine was networked (and ultimately reachable from the Internet), is it a case where security has unintentionally been compromised for the sake of simpler administration and package distribution by remote authors?

Does being an open-source company make the recovery process any different than if it was a closed-source company? The public release of most of the source code to Half Life 2 (2003), Diebold Election Systems (2003), and partial source code to Cisco's IOS (2004), and Windows NT and 2000 (2004) didn't appear to have any major ramifications that could be linked to the breaches either in the period immediately subsequent to release or after.

If the attacker hadn't uploaded modified OpenSSH packages then the attack against Red Hat's systems might have gone unnoticed for a longer period of time.

There have been reports of attacks against SSH-enabled systems that come as a strange coincidence to this breach of Red Hat's systems. It may be that the attacks are related to the weakened Debian OpenSSH versions from a couple of months ago, but the timing suggests that the Red Hat breach is the more likely trigger for the event. With one of the goals of the infecting rootkit being to recover valid SSH keys from a compromised system it makes it harder to work out exactly how a breach has taken place when the attacker is able to use valid authentication credentials to gain access to a trusted system.

A question that all those responsible for systems and network security should be asking themselves now is just how much can they trust that their systems haven't been silently compromised, or compromised through trusted channels. Successful hacks are a matter of when, not if.

Even if you are running systems and application software that can be verified from the source, you still have to trust that at some level there is someone or some organisation that knows what they are doing and place your trust there. For a lot of users and administrators that run Fedora and Red Hat systems that trust is placed in the organisations responsible for the distributions and the servers associated with them. That trust, which in most cases is well placed, would have eventually resulted in widespread vulnerable systems if it hadn't been picked up on in this instance.

Ken Thompson's Reflections on Trusting Trust should be required reading for anyone who has to be involved in this sort of work.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags Red Hat

More about CiscoDebianFedoraLinuxRed HatSlashdot.orgSSHUbuntu

Show Comments
[]