Red Hat admits breach of its servers, Fedora
Infrastructure servers compromised by hackers company says
Network World - Red Hat confirmed Friday that hackers compromised infrastructure servers belonging to the company and the Fedora Project, including systems used to sign Fedora packages.
In the Fedora breach, company officials said they had "high confidence" the hackers did not get the "passphrase used to secure the Fedora package signing key." Regardless, the company has converted to new Fedora signing keys.
Red Hat's Fedora project leader Paul Frields made the announcement Friday on the fedora-announce-list with the subject line "Infrastructure Report." When contacted, Red Hat officials pointed to Frields' announcements as the company's official statement.
In the Red Hat compromise, the intruder was able to sign a small number of OpenSSH packages relating to Red Hat Enterprise Linux 4 (i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64 architecture only).
As a precaution, Red Hat released an updated version of those packages, a list of tampered packages and a script to check if any of the packages are installed on a user's system.
"This is a significant issue and they have to work to address it," says Jay Lyman, an open source analyst with The 451 Group. "These are some of the growing pains of a distribution becoming more complex. They are building more and more into their operating systems, and with that comes more complexity and more challenges. But what I think is most important here is the response."
Red Hat first hinted at a problem on Aug. 14, when Frields wrote that the Fedora infrastructure team was investigating an issue that could result in some service outages. The message was followed up on Aug. 16 saying the team was "continuing to work on the problem."
By that time, there were grumblings and rumors online and in discussion groups that internal systems may have been hacked, which indeed was the case, and was confirmed Friday by Red Hat.
In his announcement, Frields said changing the Fedora signing keys could require "affirmative steps" from every Fedora system owner or administrator, and said, if needed, those steps would be made public.
Frields also said that through checks of Fedora packages and source code that the company did not think packages had been compromised and said "at this time we are confident there is little risk to Fedora users who wish to install or upgrade signed Fedora packages."
The Fedora Project released alpha code for Fedora 10, its next version, earlier this month.
On the Red Hat side, the company issued an OpenSSH update and guidance on how users can protect themselves.
The company said it was "highly confident" that the Red Hat Network , an internal system that makes updates and patches available to its customers, was not compromised by the hacker.
The company, however, said it was issuing its alert for those who "may obtain Red Hat binary packages via channels other than those of official Red Hat subscribers."
Frields also made it clear that the affects of the intrusions on Fedora and Red Hat were not the same and that Fedora packages are signed with keys different from those used to sign Red Hat Enterprise Linux packages.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts