SquirrelMail Repository Poisoned 182
SkiifGeek writes "Late last week the SquirrelMail team posted information on their site about a compromise to the main download repository for SquirrelMail that resulted in a critical flaw being introduced into two versions of the webmail application (1.4.11 and 1.4.12). After gaining access to the repository through a release maintainer's compromised account (it is believed), the attackers made a slight modification to the release packages, modifying how a PHP global variable was handled. This introduced a remote file inclusion bug — leading to an arbitrary code execution risk on systems running the vulnerable versions of the software. The poisoning was identified by a difference in MD5 signatures for version 1.4.12. Version 1.4.13 is now available."
When a member of the team arrived for work (Score:4, Funny)
SquirrelMail team's first response after discovery (Score:5, Funny)
SquirrelMail is poisoned, so... (Score:2, Funny)
The Horde for the what? (Score:2)
You know... (Score:5, Interesting)
Re:You know... (Score:5, Insightful)
In fact, if an attacker can tamper with the website on any point (including a router/proxy on the way), they can change the md5 whenever they change any other communication if they only care enough. For any resilience, you'd need public key cryptography; but even then you will be only as safe as the least safe private key.
Re: (Score:2)
What's the point?
What's the point, indeed. We should have moved away from MD5 signatures years ago. It's only a matter of time before some maliciously inclined asshat starts forging MD5 signatures on FLOSS packages, just to prove a point.
MD5 is broken [schneier.com] and should [wikipedia.org] not be used [cryptography.com]. It's time the FLOSS world went to at least SHA-224, if not SHA-512 (for future proofing, lots of bits). And just for reference, there is an open call [nist.gov] for a new secure hash [schneier.com].
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
...I've never made sure to always check my MD5 signatures, but I damn sure am now.
Unfortunately, the next guy will just edit the .md5 files to contain the correct signature.
(For those who don't get it: MD5 only caught it because the 'hacker' didn't think to check for MD5 signatures. They're trivial to regenerate after you change the file.)
GPG signing is more secure, but if the secret key is compromised, they can be faked as well. That said, there are at least revocation procedures that can catch it even if you don't read the news.
Re: (Score:3, Interesting)
And that's relatively
Not just Gentoo. (Score:2)
Re: (Score:2)
Re:You know... (Score:5, Informative)
(For those who don't get it: MD5 only caught it because the 'hacker' didn't think to check for MD5 signatures. They're trivial to regenerate after you change the file.)
Correction: MD5 caught it because the MD5 files are stored on the main SquirrelMail server and the packages that were altered were stored on SourceForge. The "hacker" didn't have access to the former, so he couldn't change them.
Hope this helps...
Re: (Score:2)
Re: (Score:2)
Current (and future, very likely) releases now have PGP signatures in addition to MD5 signatures. PGP signatures would be a lot more difficult to fake.
Hope this helps...
Re: (Score:2)
Re: (Score:2)
Thankfully, no!
What's easy is to create 2 files with the same MD5. What's still hard is to create a file with the same MD5 as an existing file.
Re: (Score:2)
What's easy is to create 2 files with the same MD5. What's still hard is to create a file with the same MD5 as an existing file.
Or more to the point hard to create a file with the same MD5 and still manages to contain functional code
You can do anything you want with random characters but uploading that would have been pointless.
Re: (Score:2)
Actually that's not that hard [slashdot.org].
Re: (Score:2)
Re: (Score:2)
In any case, the fact that you cannot easily create an md5 preimage is the important fact (md5 was mostly designed for this thing to be hard to do).
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Sort of like backups, isn't it? We all know we should do it, but we never really do until it is too late...
Re: (Score:2)
Even Ubuntu doesn't seem to care about MD5 (Score:2)
6709ff39ea47d3563b537b67153f60ee0c932a93
When I downloaded the ISO through BitTorrent, though, I found this instead:
kwtm@host ~/isocd$ md5sum kubuntu-7.10-desktop-i386.iso
ae9b209fe4b9caf545fa2011631de797 kubuntu-7.10-desktop-i386.iso
I mean, this is coming through BitTorrent, so other than myself, there must be thousands o
Re: (Score:2)
That's funny, because an md5 checksum is always 128 bits, i.e. 32 bytes. Read the bottom of the page: info hash: SHA1 hash of the "info" section of the metainfo (*.torrent) Try "sha1sum" next time, and on the correct file.
Re: (Score:2)
This is NOT a MD5 of the file it is a SHA1 hash of the info section of the torrent which contains the SHA1 hashes of the individual peices of the file and some other metainformation.
Re:beyond md5 (Score:4, Informative)
Re: (Score:3, Informative)
But I'm sure it would be no problem for your über-hacker or for Chuck Norris.
Re: (Score:2)
Re: (Score:2)
You seem to be a little unclear on the concept. Were those DnD nerds or computer nerds? All hashes repeat, but the time required to calculate by brute force a fraction of the 2^128 different padded files until you might hit the one you want is designed to be years with the current technology and what we are expected to have in 10 years. MD5 is broken because there are shortcuts to make this calculation easier. However, the po
Re: (Score:2)
The project we were talking about was doing the opposite to what I suggested. To do what we wanted would take a large cluster only days to complete so I assumed that in the other direction would be similar (not the same, similar, since you are in to semantics), I really should have thought about it further and realised it was a power. Lucky I don't have to work with you or help you on a project, one minor mistake and it's out in the
Re: (Score:2)
Re:beyond md5 (Score:4, Informative)
From there:
"The code modifications did not made it into our source control, just the final package. We are currently investigating older packages to see if they were also compromised. "
Ouch. Is RoundCube stable yet? (Score:2, Informative)
I've not evaluated it recently. Horde is a PITA to set up and this doesn't give me confidence in the SM team.
Re:Ouch. Is RoundCube stable yet? (Score:4, Informative)
Re: (Score:3, Informative)
I use it on my site and install it for customers. You won't build a "hotmail" with it, and a rich user client like Thunderbird is almost always a better choice for users, but for those who need web access to their email, it is absolutely great.
Re: (Score:2)
Re: (Score:2)
There used to be some IMAP to WAP client based on PHP, but it had all kinds of crazy problems like you had to hardcode your login to the config file. It also was read only - you couldn't send mail from the phone.
Is there anything new on the market for mobile users?
Re: (Score:2)
Their stuff runs on Java with Tomcat, but is reasonably good. The mobile client is decent (Claros Mini). If you dig Tomcat, that is
Re: (Score:2)
Then you should probably stay away from Debian [linuxinsider.com], Sendmail [cert.org], Apache [apacheweek.com], or...well, hell, just stay away from Open Source, period, if a server/distro compromise is the measuring stick you use to measure "confidence."
Re:Ouch. Is RoundCube stable yet? (Score:5, Informative)
Roundcube has great potential, but it isn't nearly as mature as SM. It does seem to be getting better though. The big problem I have with Roundcube is it doesn't have plugins. No plugins = no Sieve filters (avelsieve), which is a big deal to me. No plugins = no other cool things that Squirrelmail has like importing and exporting address books from all kinds of crazy places, no admin plugins, etc...
Someday though. It has always looked and functioned way nicer than squirrelmail, it just needs more backend sysadmin goodness.
Re: (Score:2, Informative)
Re: (Score:2, Informative)
I've just installed Round Cube 0.1-RC2 on my webserver to get reliable access to my non-work email. Apart from the dubious 0.1 version number (way to instil confidence in the end users: call an otherwise stable first release 1.0!) it is significantly more reliable than beta1 and even more crisply polished than before.
SquirrelMail and Horde are mature, yes, but they seem to bloat. I just want a lightweight, well-designed web access system so I don't have
Bad design (Score:5, Funny)
Re:Bad design (Score:5, Funny)
FWIW
Re: (Score:2)
Re: (Score:2)
The problem first started when they missed the fact that tubes were designed with mice and hamsters in mind.
Re: (Score:2)
Re: (Score:2)
Thank Heaven For Open Source (Score:5, Insightful)
Re:Thank Heaven For Open Source (Score:4, Interesting)
I also like how you blanket-troll all vendors of proprietary applications as if none posses basic ethics.
Re: (Score:2)
What's wrong with anything you just described? These are all good traits. It maximizes cooperation toward a common goal. It's terribly misleading to ignore the fact that the public access is read-only.
I also like how you blanket-troll all vendors of proprietary applications as if none po
Re:Thank Heaven For Open Source (Score:5, Insightful)
Considering the trend for outsourcing, probably more than you'd think. A lot more yet simply ship the code off to India or Latvia or somewhere, get it back, perform no real reviews of the code, and ship it out.
He does paint with a bit of a broad brush; but he also has a point. Commercial, closed source vendors are running a business and their primary motivation is money. Sadly, that often means hiding security breaches from users, even when that places those users at risk. OSS projects may have commercial motivations as well, but because of the process they cannot easily hide this type of problem... which is good for users.
Re: (Score:2)
Nobody knows.
Re: (Score:2)
What does that have to do with anything? The repository was compromised because one of the developer's accounts was compromised. This also happens in companies.
In addition, I suspect that corporate developers are more likely than FOSS developers to put in backdoors themselves--bec
Has the compromised account been secured? (Score:4, Interesting)
They got lucky (Score:4, Insightful)
Re: (Score:2, Informative)
Re:They got lucky (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
At first, I saw "Squirrel... (Score:2)
Re: (Score:2)
I'm NOT going to try to give any squirrel (male or female) a suppository!! It seems like it would have similar results to sticking your hands in a running garbage disposal in your sink.
There's bound to be a better way to poison your male squirrels than suppositories!
three versions compromised (Score:1, Informative)
Was Tom Lehrer behind this? (Score:1)
Re: (Score:2)
He's thorough. _
Makes me wonder (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
That's one of the great things about SourceForge, though. CVS and Subversion are part of the repository they provide to projects hosted there, so your developers only have to be users and not worry about administration of a version control system. They also provide a bug tr
Re:Makes me wonder, oops (Score:2)
Re: (Score:2)
I've seen "Change Management" and "Configuration Management" used interchangeably as "CM" in "SC/CM" quite a bit. I think it makes sense, because versioning of config files in some environments can be as useful as versioning of source code.
I support the interchangeable use based on the grounds that depending on your perspective there's not much difference and that
Don't trust squirrels! (Score:5, Funny)
Re: (Score:2)
That obstacle course looks like it could be a level in Super Mario Galaxy. Instead of Mario grabbing the star, the squirrel grabs the nut!
O.U.C.H. (Score:2)
Actually, I think I know one way of doing this that doesn't require the distribution builder's machine to be compromised and which also means that matching even simple signatures like an
Weeee... (Score:2, Informative)
Open vs. Closed Source Security Implications (Score:3, Insightful)
Re: (Score:3, Informative)
1.4.11 and 1.4.12 were released uncompromised. In very late November, someone hacked a developer's SourceForge account and uploaded compromised versions of 1.4.11, 1.4.12, and 1.5.1. As soon as the problem was found in the stable branch, an announcement was made and the original 1.4.x versions restored. As soon as someone came onto Freenode #squirrelmail and explained the EXACT security implications of the poisoned releases, 1.4.11 and 1
1.5.1 was compromised as well... (Score:5, Informative)
Yesterday morning it was discovered that the 1.5.1 (development) release had been compromised as well. It hadn't been discovered until then as the hacker had modified a different file in a slightly different way. If you're running a version of 1.5.1 that had been downloaded after sometime in late November, then it would be a good idea to remove it or replace it with a SVN release (which was not compromised).
There's no official announcement yet, but 1.5.1 has been pulled from distribution and an official announcement will probably be forthcoming.
Hope this helps...
Re: (Score:2)
Me thinks that was a probably a cracker, not a hacker.
Cracker: Malicious, illegal, wants to do damage (usually for their benefit)
Hacker: Just wants to help fix security holes in unorthodox way, play as well, and do no damage.
Seems cruel (Score:2)
"andweeee. . ." Tag (Score:2, Funny)
Slashdot tags are now officially funnier than the posts themselves.
lol good or bad? (Score:2)
Our cheesy email provider is on 1.4.9a.
Horde is the other choice and a newer version than when i last tried to use the web interface, looks confusing for any of our users now.
How would one set up their own email server with something like this? Would i want to since this only cost $150/year? Just use outlook that will come with the small biusiness server next year?
Alternative webmail? (Score:3, Interesting)
OSS or closed source, it doesnt matter to me, just anything that is good. Squirrelmail is what I use right now, and well its ugly and it doesnt seem like they ever plan on making it look like a modern webmail client should.
Re: (Score:2)
How well does that work for ya when you're visiting family for the holidays and want to use their Wii to check your email?
I use native clients 99.9% of the time, but still have a webmail interface on my home server for the other .1% when I don't have the option of installing software on a borrowed machine (or simply don't want to).
Re: (Score:2)
It's always some (Score:2, Funny)
Isn't there a simple way to check for this? (Score:2)
Download package
Check for matching hash
If hash doesn't match, send notification email/SMS/whatever
Even if the site is compromised and the hacker (cracker!) changes the
Re: (Score:1, Troll)
Re: (Score:2)
In summary: whooooosh!
Re: (Score:2)
If it ain't broke, don't fix it.
Re: (Score:2)
Re:Good thing UWRF techies are lazy (Score:4, Informative)
So, if someone (like your techies) had installed 1.4.12 within a few days of its release, chances are they would have gotten an uncompromised version. I had installed 1.4.12 a couple of hours after release, and after the compromise was found I checked and found mine was an authentic release.
Re: (Score:2)
Re: (Score:2)
Also, about the only thing that can't be faked with the header you posted is the IP address that connected to your server (of which you didn't include). Check your server logs.
This has nothing to do with SquirrelMail. Though they may have other problems, this one is only SM doing its job and showing what your MTA has accepted.
Re: (Score:2)
Citadel? (Score:2)