Red Hat admits breach of its servers, Fedora
Infrastructure servers compromised by hackers company says
Network World - Red Hat confirmed Friday that hackers compromised infrastructure servers belonging to the company and the Fedora Project, including systems used to sign Fedora packages.
In the Fedora breach, company officials said they had "high confidence" the hackers did not get the "passphrase used to secure the Fedora package signing key." Regardless, the company has converted to new Fedora signing keys.
Red Hat's Fedora project leader Paul Frields made the announcement Friday on the fedora-announce-list with the subject line "Infrastructure Report." When contacted, Red Hat officials pointed to Frields' announcements as the company's official statement.
In the Red Hat compromise, the intruder was able to sign a small number of OpenSSH packages relating to Red Hat Enterprise Linux 4 (i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64 architecture only).
As a precaution, Red Hat released an updated version of those packages, a list of tampered packages and a script to check if any of the packages are installed on a user's system.
"This is a significant issue and they have to work to address it," says Jay Lyman, an open source analyst with The 451 Group. "These are some of the growing pains of a distribution becoming more complex. They are building more and more into their operating systems, and with that comes more complexity and more challenges. But what I think is most important here is the response."
Red Hat first hinted at a problem on Aug. 14, when Frields wrote that the Fedora infrastructure team was investigating an issue that could result in some service outages. The message was followed up on Aug. 16 saying the team was "continuing to work on the problem."
By that time, there were grumblings and rumors online and in discussion groups that internal systems may have been hacked, which indeed was the case, and was confirmed Friday by Red Hat.
In his announcement, Frields said changing the Fedora signing keys could require "affirmative steps" from every Fedora system owner or administrator, and said, if needed, those steps would be made public.
Frields also said that through checks of Fedora packages and source code that the company did not think packages had been compromised and said "at this time we are confident there is little risk to Fedora users who wish to install or upgrade signed Fedora packages."
The Fedora Project released alpha code for Fedora 10, its next version, earlier this month.
On the Red Hat side, the company issued an OpenSSH update and guidance on how users can protect themselves.
The company said it was "highly confident" that the Red Hat Network , an internal system that makes updates and patches available to its customers, was not compromised by the hacker.
The company, however, said it was issuing its alert for those who "may obtain Red Hat binary packages via channels other than those of official Red Hat subscribers."
Frields also made it clear that the affects of the intrusions on Fedora and Red Hat were not the same and that Fedora packages are signed with keys different from those used to sign Red Hat Enterprise Linux packages.
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!