New rsync Released to Fix Vulnerability 226
cshields2 writes "Today the rsync developers have released a new version that fixes an exploitable security vulnerability when running rsync as an 'rsync server.' Any server out there running rsync should check this out and upgrade if necessary. (which is every open source mirror server out there, and many mirrors themselves)"
Gentoo (Score:5, Informative)
Re:Gentoo (Score:5, Insightful)
Re:Gentoo (Score:1, Interesting)
What would be nice, would be if some of the developers focused on security from the jump, sort of OpenBSD'ish, and no I'm not making a comparison, sort of throwing an idea for devels to use preemptive strikes, assessing a s
Re:Gentoo (Score:5, Insightful)
Security breaches happen. Even on OpenBSD and other "secure" systems. If you looked into the event at all, you would see that Gentoo did indeed have excellent security counter measures in place. No amount of firewalling is going to stop an *unknown* vulnerability from being exploited. No amount of security auditing is going to find *every* exploit in code as complex as gentoo's. The fact that the compromised server could be restored, and the compromising code be analysed and fixed within twenty-four hours is very impressive. If anything, this is a testiment to the security at gentoo.
If I were a CTO or someone who was checking to make a switch, this would be very impressive. I don't, however, think this is gentoo's target audience. But I do know that Microsoft definitely does not have turn-around times that impressive.
Re:Gentoo (Score:2)
That's why I wrote Ostiary [homeunix.org], because I can't afford to keep up with all the latest patches the instant they come out. It can be used to remotely enable and disable services (by starting/stopping, them, altering the hosts.allow/deny files, etc.)
The protocol it uses is so brick stupid it's effectively unhackable. It can still be DOSed, of course, but nobody's come up with a way to directly subvert it. It's very small and light, there's even a Palm client for it. No, it's not the an
Re:Gentoo (Score:2)
Re:Gentoo (Score:2)
Wrong... Microsoft usually releases a patch months BEFORE any attack, yet it still happens because nobody bothers to patch. (i.e., code red, sql slammer). So, who has the lower tunaround time? Microsoft at -3 months or Gentoo at +1 day after you have been rooted?
OSS/Free software usually tries not to mess up in the first place. They also fix problems in the code before exploits. But everyone is human and shit happens. The fact is slashdot has reported on patches for vulnerabilities on many platforms
Re:Gentoo (Score:2)
Re:Gentoo (Score:2)
Re:Gentoo (Score:2)
Re:Gentoo (Score:2)
It certainly wasn't unknown to the cracker.
Re:THATS GENTOO PROPOGANDA, ZEALOT (Score:2, Informative)
Credits (Score:4, Informative)
-------
The rsync team would like to thank the following individuals for their
assistance in investigating this vulnerability and producing this
response:
* Timo Sirainen
* Mike Warfield
* Paul Russell
* Andrea Barisani
Regards,
The rsync team
http://lwn.net/Articles/61541/
Re:Gentoo (Score:1)
It must have been this exploit, though.
Re:Gentoo (Score:3, Insightful)
Re:Gentoo (Score:2)
chroot (Score:4, Insightful)
Maybe I can't see the forest for the trees, but why would you NOT want to be chrooted?
Re:chroot (Score:4, Insightful)
Re:chroot (Score:2)
The only problem I have is that file permissions are not preserved. My solution is to run:
ls -Rl / | /usr/bin/bzip2 > /root/perms.txt.bz2
prior to each backup so that there is at least a record of the permissions. Does anyone know a better way?
Re:chroot (Score:4, Informative)
from the manpage:
"This option causes rsync to update the remote permissions to be the same as the local permissions."
RTFM
Re:chroot (Score:3, Informative)
So in other words, you want to use option -p. Or why not just use -a
Snapshot-Style Backups with rsync (Score:2, Interesting)
Basically it uses rsync and cp to create a backup, but only changed files are actually copied; unchanged files are simply linked to. This saves a lot of disk space, and allows you to keep many backups on the system at one time, assuming most of your files don't chang
Remote backups using rsync. (Score:2)
Re:chroot (Score:1)
Re:chroot (Score:2, Funny)
*boomtish*
*ducks flying rotten fruit*
Workaround (Score:3, Informative)
Re:Workaround (Score:1)
Re:Workaround (Score:1)
Re:Workaround (Score:2, Insightful)
don't run rsync as a server
is not a workaround -- it's throwing the baby and the server out with the bathwater!
Re:Workaround (Score:3, Insightful)
That's how I use it, but I'm not running a site like Gentoo's.
If I were, I'd rather run an rsync server than give shell logins to every Tom Dick and Mary.
Re:Workaround (Score:2)
Re:Workaround (Score:5, Interesting)
What if I don't want system users for every rsync user? What if I need to run my connections through an http proxy server (yes, I really, really do)? What if I want standard mechanisms for listing available modules? What if I want to limit the number of simultaneous connections for a specific area? What if I want to limit the files available in a specific area? What if I want to transfer sensitive files on a system periodically from cron, but I don't want to have an ssh key that grants access to do this without a password on the recipient machine?
I think that pretty much sums up the ways I most commonly use rsync around the house. I do use it with the -e ssh option for one-off things sometimes as well, but not running a server is certainly no workaround for me.
rsync (Score:5, Funny)
rsync releases a patch and changes its name to r'sync. The change is noted to increase its name recognition in the teenybopper script kiddie market. At this point, no pimply-faced l337 d00dz will dare deface r'sync for fear that they will be further alienated by the female species.
Unfortunately, timberlake and FatOne continue to be backdoored.
Re:rsync (Score:5, Funny)
this is why i dont use any package management (Score:3, Funny)
Re:this is why i dont use any package management (Score:2, Insightful)
Re:this is why i dont use any package management (Score:2)
But since you mentioned RedHat already had a patch, I'd like to say that the updated Mandrake package is also avalilable. And yes, it works for everybody, not just for mandrake club subscribers.
The main reason I am posting this is for people to see that there are options among the "big distros" to remain with a secure system without having to worry about having an expensive subscription contract signed.
arg. (Score:5, Funny)
Doh!
Package Download (Score:3, Interesting)
http://slackware.com/security/viewer.php?l=slackw
Of course if you're running a server you should theoretically be subscribing to the security mailing list. Right?
Fortunately... (Score:1, Informative)
FSF Savannah Server Compromised (Score:5, Informative)
Re:FSF Savannah Server Compromised (Score:3, Interesting)
While it can be somewhat distressing, these attacks can only make us stronger.
It's kinda sad, really. I mean, we're just a big happy group of people who write code for the fun of it, and then share it with everybody else. We're a decent bunch. What did we do to deserve all this hostility?
Re:FSF Savannah Server Compromised (Score:2)
What makes you think the people that do this sort of thing care about what we 'deserve'?
They could do it for many motivations. On one extreme, there's the profit motivation of an attacker from a competing project (profit in money or recognition - whatever). On the other extreme there's the idiots who do this sort of thing for the hell of it.
There's any number of reasons people do this sort of thing, and some of them don't even involve a motivation!
PGP-sign everything (Score:5, Insightful)
I hope that this will provide more incentive for Open Source programmers and Linux distributors to properly secure their releases. This entails ensuring that from the time a package leaves a maintainer to the time it reaches a user there should be no possibility of tampering.
Authors/maintainers need to generate PGP keypairs and start signing their archives. MD5 checksum distributed alongside the package does not cut it -- how are we to know the package wasn't tampered with and a fresh checksum generated? No, the only way we can really feel secure is to have authors use PGP on a regular basis to verify their work, and to integrate public key/private key into CVS in order to have submitters automatically sign their changes to the source.
Then things like the Savannah hack and the various mirror compromises will only be a black eye instead of a serious threat to the Open Source methodology.
Re:PGP-sign everything (Score:5, Insightful)
Re:PGP-sign everything (Score:2)
I agree that would be ideal, but it's easier said than done. I've got no other signatures on my GPG key now. I want to get some, but I don't know anyone else around here who does that sort of thing. How would I go about getting some? I know they h
Re:PGP-sign everything (Score:3, Informative)
sure they could be wrong, but you'd think the real author would notice someone posting technical messages in his name....
Organize a local key-signing party! (Score:2)
People take advantage of conventions to organize key-signing parties because diverse groups of people from many geographic locale
Re:Organize a local key-signing party! (Score:2)
Re:PGP-sign everything (Score:2)
Whenever you travel to a big city, it can be useful to check the site, too. There's nothing like getting a cup of coffee with a crypto nerd to keep you from meeting women in a new city.
Re:PGP-sign everything (Score:2)
So wouldn't it make more sense to go to a PKI system and use user certificates issued by a trusted name like Verisign? (giggle).
My money's on the shifty-eyed dog with the... (Score:2)
Re:FSF Savannah Server Compromised (Score:2)
OSS has pissed off a lot of very rich and powerful people and those people could pay top dollar for a good cracker so they may never get caught.
Re:FSF Savannah Server Compromised (Score:2)
Why? Because they all used the same vulnaribility which was not known to anybody. They all attacked linux projects (no freebsd ones). They concentrated their attacks on repositories.
"Is it too much for you to imagine that someone wants to put backdoors into Linux?"
Again who would want to do such a thing? I would think that list would
Re:FSF Savannah Server Compromised (Score:2)
OK. But they have been found guilty. They have been sued many many times for stealing technology and backstabbing. Most were settled eventually by MS coughing up hundreds of millions of dollars.
"And SCO may be acting unethically, but I've yet to see them found guilty of anything except stupidity"
Then you
Re:FSF Savannah Server Compromised (Score:2)
There is nothing sadder and a corporate apologist. When I was in High school many many years ago there were people who used to wear Nike shirts and shoes and thought they were superior to people wearing any other brand of shoes. There were guys who would pledge allegience to Ford or Chevy and put little bumber stickers on their cars denigrating the other manufacturer.
I always thought these people were
Re:FSF Savannah Server Compromised (Score:2)
Actually, it has been established in court that Microsoft bugged their victim/competitor's hotel room to gather commercial intelligence. This was some time ago, perhaps in the early 90s. I don't know if they were found guilty or even if this was a crime in the relevant jurisdiction. It certainly indicates a willingness to descend to unethical tricks.
And SCO may be acting unethically, but I've yet to see them found guilty of anything except stupi
SSR#4 (Score:2, Funny)
Yay! This was so fast. Even when we suck we don't suck!
I would just like to say... (Score:5, Informative)
Re:I would just like to say... (Score:1)
Re:I would just like to say... (Score:3, Informative)
They posted an alert this morning.
http://lists.debian.org/debian-security-announce/
Since the update servers were offline due to the recent security hacks, they gave you a direct link to update.
Re:I would just like to say... (Score:5, Informative)
> days if i hadn't read slashdot and didn't have
> Fedora to alert me.
Why don't you subscribe to the Debian security announcement list? It is a very low-traffice list and you will get an e-mail as soon as an updated package is available.
By the way, for your interest, here are the times on the rsync e-mails to bugtraq today (in my time zone):
Slackware: 2:50AM
Debian: 11:09AM
SuSE: 12:14PM
Gentoo: 3:13PM
Connectiva: 3:46PM
Red Hat: 4:14PM
Re:I would just like to say... (Score:2)
Debian Security Advisory (Score:1, Interesting)
Some history.. (Score:5, Interesting)
Re:Some history.. (Score:3, Insightful)
Don't be ridiculous. There was no 2.5.7 release before the Gentoo compromise. I know because I was one of the team that responded to the intrusion and produced the patch. The machine was crashed on Tuesday and the patch came out on Thursday, about 36 hours later.
I suppose you're running kernel 2.7 as well?
Only affects Rsync servers (Score:3, Informative)
No. This does not affect all the open source mirrors. It only affects rsync SERVERS. If you are not running rsync as a server, you are OK. If you are not accepting connections on 873 you are not running an rsync server. (Well, you could be, but you are probably running it over SSH, in which case you are still OK.)
RedHat RPMs for fix (Score:5, Informative)
When updating an older server (7.1, I think), the RH RPM failed with a GLIBC dependency. The updates for RH are identical for 7.1 - 9, so you might have a problem here.
My easiest workaround was to rebuild the rpm from source with:
Get the rsync-2.5.7-0.9.src.rpm from RedHat ftp server updates.redhat.com
Install the source rpm with:
rpm -ivh
Build a new complete, clean set of RPMs with:
cd
rpm -bb rsync.spec
The new installable binary for your current lib versions is in
rpm -Fvh
---
For those that don't use rsync, this is easily one of the most useful utilities on the box. I particularily like "modules" mode over ssh. Setup an ssh key and have the key auto-run rynnc --daemon. You get modules and ssh. Really cool.
Advisory from the rsync team (Score:3, Informative)
rsync 2.5.6 security advisory
December 4th 2003
Background
The rsync team has received evidence that a vulnerability in rsync was
recently used in combination with a Linux kernel vulnerability to compromise
the security of a public rsync server. While the forensic evidence we have is
incomplete, we have pieced together the most likely way that this attack was
conducted and we are releasing this advisory as a result of our
investigations to date.
Our conclusions are that:
rsync version 2.5.6 and earlier contains a heap overflow vulnerability that
can be used to remotely run arbitrary code.
While this heap overflow vulnerability could not be used by itself to obtain
root access on a rsync server, it could be used in combination with the
recently announced brk vulnerability in the Linux kernel to produce a full
remote compromise.
The server that was compromised was using a non-default rsyncd.conf option
"use chroot = no". The use of this option made the attack on the compromised
server considerably easier. A successful attack is almost certainly still
possible without this option, but it would be much more difficult.
Please note that this vulnerability only affects the use of rsync as a "rsync
server". To see if you are running a rsync server you should use the netstat
command to see if you are listening on TCP port 873. If you are not listening
on TCP port 873 then you are not running a rsync server.
New rsync release
In response we have released a new version of rsync, version 2.5.7. This is
based on the current stable 2.5.6 release with only the changes necessary to
prevent this heap overflow vulnerability. There are no new features in this
release.
We recommend that anyone running a rsync server take the following steps:
Update to rsync version 2.5.7 immediately.
If you are running a Linux kernel prior to version 2.4.23 then you should
upgrade your kernel immediately. Note that some distribution vendors may have
patched versions of the 2.4.x series kernel that fix the brk vulnerability in
versions before 2.4.23. Check with your vendor security site to ensure that
you are not vulnerable to the brk problem.
Review your
"use chroot = no" then remove that line or change it to "use chroot = yes".
If you find that you need that option for your rsync service then you should
disable your rsync service until you have discussed a workaround with the
rsync maintainers on the rsync mailing list. The disabling of the chroot
option should not be needed for any normal rsync server.
The patches and full source for rsync version 2.5.7 are available from http://
rsync.samba.org/ and mirror sites. We expect that vendors will produce
updated packages for their distributions shortly.
Credits
The rsync team would like to thank the following individuals for their
assistance in investigating this vulnerability and producing this response:
Timo Sirainen
Mike Warfield
Paul Russell
Andrea Barisani
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0962 to this issue.
Regards,
The rsync team
Re:Advice for everybody: (Score:2, Funny)
Re:Eh? (Score:5, Informative)
oh really?
i rsync my local copy of slacware-current from carroll.cac.psu.edu. probably half the listed servers on the slack mirrors list (many of which host many other projects besides slack) do rsync. gentoo uses rsync for portage. kernel.org supports rsync for kernel/patch transfers.. as does sourceforge.
me thinks thou should pull thine head out of thine ass before making such silly comments. for a number of read-only connections, rsync is still quite popular.
Re:Eh? (Score:2)
You should notice that the Gentoo Portage tree is distributed through rsync to all users.
Re:Eh? (Score:1)
Re:Eh? (Score:2)
Re:HOWTO (Score:1)
tar xzvf
This has been possible in every OS (except windows) I've ever used (except for old versions of sunos)
You forgot step 0... (Score:1)
Re:u must be a 133t linux user... (Score:2)
Right. Five seconds. Hah.
The Mandrake way:
$ su
# urpmi --auto --no-verify-rpm mozilla evolution kmail OpenOffice.Org pan knode celestia kopete
And bam, you've just installed a web browser, an office suite, three mail programs, three newsgroup clients, one universal messaging client and a really cool 3D space navigating program. If you wanted to, you could put a hundred application names on that single command line, and everything gets automag
Re:Rsync Protocol Was a Bad Idea (Score:1)
BitTorrent might be worth a try too, I don't think it does incremental but should be faster than scp or ftp.
Re:Rsync Protocol Was a Bad Idea (Score:2)
Re:Rsync Protocol Was a Bad Idea (Score:2)
That is entirely because of what the rsync application does on the client and server ends, and has nothing to do with it's network protocol at all. By all means, you could do the same thing (using the rsync application) over rsh/ssh.
Re:Rsync Protocol Was a Bad Idea (Score:3, Insightful)
Re:Rsync Protocol Was a Bad Idea (Score:2)
No, your reding comprhension skills need work.
I like rsync very much, although I'm a bit limited by it's lincense.
What I DO NOT LIKE, is the rsync protocol...
Re:Rsync Protocol Was a Bad Idea (Score:2)
Anyhow, typographical errors are completely irrelevant to the point of my post, so I'm not greatly concerned.
Re:Rsync Protocol Was a Bad Idea (Score:2)
Re:Rsync Protocol Was a Bad Idea (Score:5, Informative)
Unlike ssh, rsync daemon doesn't require a user on the host system. Unlike ftp or http, rsync updates by splitting files into blocks and updating changed blocks. Unlike scp, the config file can exclude/include certain files/paths/etc. without requiring the use of filesystem permissions. (it also has password protection).
Does anyone know of a program similar to rsync
Nah, there wasn't a point to it.
You forgot... (Score:2)
Re:You forgot... (Score:2)
On Ethernet it makes little difference. On ADSL or modem or between continents rsync is enormously faster than CVS.
When I'm fetching a big CVS tree, it can be faster to do the initial checkout on a well-connected machine in the US and then move it by rsyn
Re:Rsync Protocol Was a Bad Idea (Score:2)
I fail to see how that is a disadvantage at all... FTP also requires "a user on the host system", but I don't see any complaints about that.
Re:Rsync Protocol Was a Bad Idea (Score:2, Insightful)
Of course, if you're still using FTP for non-anonymous access instead of SCP/SFTP, I'd guess that security isn't one of your priorities.
Re:Rsync Protocol Was a Bad Idea (Score:2)
NO, no, no. I was not talking about full-access accounts. I was, in fact, talking about anonymous access.
Re:Rsync Protocol Was a Bad Idea (Score:4, Informative)
CVS maintains a history of all revisions made to the files in the repository. It doesn't even have a means to synchronize clients without a versioned repository on the server, it relies on the server knowing all past revisions to determine which changes to send to the client.
Rsync works with plain files on the server, not RCS. if you *need* revision control, it's useless, but if you only want to be able to synchronize client files to match the files on the server, it's much better than CVS. The server saves space and complexity by not having to do revision control, and the client still gets the benfits of the server only needing to transmit the changed portions of files.
Re:Rsync Protocol Was a Bad Idea (Score:2)
Yes they are. I never said otherwise... Merely that rsync should stick to using SSH for it's network connections, instead of inventing a new, redundant, protocol (and I just pointed to CVS as an example--rsync already does work over ssh).
Re:Rsync Protocol Was a Bad Idea (Score:2, Insightful)
Re:Rsync Protocol Was a Bad Idea (Score:2)
Then you simply must not know SSH very well.
Re:Rsync Protocol Was a Bad Idea (Score:5, Insightful)
Re:Rsync Protocol Was a Bad Idea (Score:2)
All of that is done by the APPLICATIONS on the client and server... The network protocol it just something to get the (significantly reduced) data from point to point. There isn't too much a network protocol can do to speed up the process.
Re:rsync Protocol Was a Bad Idea (Score:5, Informative)
RTFM [samba.org], idiot.
There are several things that a new network protocol can do to make a transfer faster. For example, rsync is heavily pipelined in both directions, and removes common information from headers of consecutive files. Neither of those optimizations would be possible in FTP or HTTP.
rsync was for years the only major application that aggressively utilized full duplex TCP sockets, and found several bugs in Linux, BSD, and Solaris kernels by doing so. Again this is a protocol design decision that gets more mileage out of the connection than is possible in other ways.
Have you ever even looked at an HTTP dump? The hundreds of bytes it takes to send the headers can accomodate several whole rsync-compressed files.
A recursive update of a changed tree is typically several times quicker with rsync than with either CVS or FTP. Nothing against those protocols; they were just designed with different purposes in mind.
Now you can reasonably question whether the space saving really justifies having a new protocol. If you're not convinced, don't run it. Many people do find it worthwhile. If you are super security-conscious then you probably shouldn't be offering anonymous or unencrypted service at all.
YOU FAIL IT (Score:2)
Re:So... (Score:5, Insightful)
It seems obvious where the real talent in the Linux community lies today.
In case you hadn't noticed, the Gentoo developers based their analysis on the Debian developers' work. The real talent in the Linux community lies in the community.
Re:And in other news... (Score:2)