SpreadFirefox Security Breached (again) 140
Kurt writes "The hugely popular SpreadFirefox project, a Firefox community marketing site, has recently fallen victim to a security breach in their TWiki software. This breach has forced the site to shutdown until October 19th. During this time, they will be performing a rebuild of the SpreadFirefox system, to hopefully curb more security breaches."
Message (Score:4, Funny)
Re:Message (Score:5, Informative)
Re:Message (Score:2, Redundant)
It's Microsoft... (Score:2, Funny)
-Yogix
hm (Score:5, Insightful)
Re:hm (Score:4, Informative)
Regards,
Steve
Re:hm (Score:5, Insightful)
That's correct. OSS organizations already warn their public if something might have happened to their website.
Commercial organizations, on the other hand, don't warn their public. There may even be entire herds of goats trampling all over their website, and the public still isn't warned. Instead they quietely chase away the goats, still without a word of explanation to the public. And then completely forget to mend the fence through which the goats entered!
Re:hm (Score:1)
Re:hm (Score:2)
An alert is the least we could expect. (Score:2)
SpreadFirefox isn't any better off for alerting the community to these incidents. They're just doing what they should be doing. It's those who do not send out alerts who are truly the awful ones.
Sending out this alert does not right the situation, however. Since this isn't the first inciden
Re:hm (Score:4, Insightful)
Proprietary software authors do not have to do things "properly", they just kludge things together that may or may not work in every possible weirdy case, and rely on nobody ever seeing what an awful job they made of it in the first place. Witness any open source project that used to be closed-source {Mozilla; OpenOffice.org; Solaris}. Open Source developers have to write code that they would not be ashamed to show to anybody, because they do not know who is going to be looking at it. To quote Larry Wall, "Hubris is the quality that makes you write (and maintain) programs that other people won't want to say bad things about. Hence, the third great virtue of a programmer." They also have to write code in such a way that it won't be obvious from inspecting it how to misuse it.
Morbid curiosity is what makes people look at source code; and there are significantly more good guys than bad, so if anyone is looking at your source code, the chances are that their intentions are honourable.
Re:hm (Score:2)
Re:hm (Score:1)
While I agree with the idea that you can write insecure but pretty code, I would question that prettiness is the only criterion people use to judge the code they look at. If somethi
Re:hm (Score:2)
Fine for you. But if, say, mySQL AB doesn't want to fix a bug or fix it in that way, you're right that you're free to fork your own, assuming you can. But that doesn't help all of the other people who will, in all probability, continue to use the mainstream product.
In other words, people, like Linus, or organizations, like mySQL AB, still control "their" projects.
Re:hm (Score:2, Insightful)
Often it is the result of shoddy hardware design or trying to weld pieces of code together that were never designed for it. Sometimes you have to resort to "bad code" to achieve your goals.
Re:hm (Score:3, Insightful)
alternative to getting the code to work before the deadline.
And even then, it should only be tolerated if you've tried
and failed to move the deadline back. And then it should be
removed as soon as possible.
Ugly code, left unchecked, spreads like crazy because you
have to code around it which makes more ugly code that has
to be coded around.
Don't write ugly code.
Re:hm (Score:2)
This indicates that you don't know how a proprietary software development environment works, nor do you understand how an open-source development environment works.
Yes, there are many closed-source products where code is never reviewed or audited. But if you've ever code
Re:hm (Score:2)
Hmmm... (Score:2, Interesting)
Re:Hmmm... (Score:2)
Re:Hmmm... (Score:4, Informative)
From the email sent out, it says that:
It seems safe to assume that personal information is a subset of sensitive data, no?
Wrong Date (Score:5, Informative)
Re:Wrong Date (Score:3, Funny)
Re:Wow, on the heels of the HP/Netscape news... (Score:4, Informative)
Why? Because Mozilla isn't port of the OS. Exploits in IE have tended to open up the entire OS to virus and malware. Exploits in Mozilla tend to crash Mozilla. Same thing with Outlook and Thunderbird.
Finally to answer this statement of yours
"Wake up kids. They're as fallible as anyone at Microsoft and things like this will happen. Whether it is the browser or the websites hosting or the wikis, or whatever, mistakes are going to be made and patches and corrections will need to be done."
If you look at the spreadfirefox.org website you will see this statement "This site is not connected to the Mozilla Foundation"
So... your point is? The cracking of this website that is in not connected to the Mozilla Foundation proves what????
I agree that Mozilla is not perfect just better than IE.
Re:Wow, on the heels of the HP/Netscape news... (Score:1)
So... your point is? The cracking of this website that is in not connected to the Mozilla Foundation proves what????
Just FYI, the hacked site under discussion is www.spreadfirefox.com which is "the official Mozilla site for Spreading Firefox". The
Re:Wow, on the heels of the HP/Netscape news... (Score:2)
BTW since the problem was in a piece of software on the site that was not written by the Mozilla foundation my comment still stands that it proves nothing about the quality and security of Mozilla.
Re:Wow, on the heels of the HP/Netscape news... (Score:2)
Thi
Re:Wow, on the heels of the HP/Netscape news... (Score:4, Insightful)
Because the guys behind Mozilla/Firefox are clearly the same people as those who write TWiki [twiki.org], right? And the guys who run the Firefox marketing site are clearly exactly the same guys who do the hardcore browser development too.
I'm all for pointing out when anyone fucks up, regardless of if they're saintly Firefox developers or "t3h evil 0ne5" at Microsoft. Nevertheless, if we're going to start pointing fingers at anyone and scoring cheap points, can we at least make sure it's, y'know... their fault?
Short-sightedly knee-jerking and implying a marketing-run website crack is in any way a reflection of the security of an entirely separate developer-run product is just as bad as the people you're having a go at that think FL/OSS developers' shit smells of roses.
Re:Wow, on the heels of the HP/Netscape news... (Score:2)
First, I would not have. You presume too much.
Secondly, I would have, however, stood by anyone who wanted to bash Microsoft for their lax patching schedule. Likewise, feel free to bash The SpreadFirefox crew for their lack of admin skills.
However, if someone had tried to imply that someone cracking a Microsoft site through a third-party application was in any way
Not Mozilla software that was hacked (Score:3, Informative)
Re:Not Mozilla software that was hacked (Score:3, Insightful)
Re:Not Mozilla software that was hacked (Score:3, Informative)
Yeah, except that:
Re:Not Mozilla software that was hacked (Score:5, Informative)
Re:Not Mozilla software that was hacked (Score:2)
We were promised that this would not happen again. (Score:2)
Please see the Slashdot comments:
http://it.slashdot.org/comments.pl?sid=155997&cid= 13079208 [slashdot.org]
http://it.slashdot.org/comments.pl?sid=155997&cid= 13079261 [slashdot.org]
We were promised that this would not happen again. Yet it did.
Re:Not Mozilla software that was hacked (Score:1)
Until the actual mozilla.org site gets hacked, which I highly doubt it will ever happen, there's nothing to worry about.
Dude, don't temp the hackers! To some this reads like a challenge (that I hope they don't succeed at) ;)
Can you imagine... (Score:3, Insightful)
Re:Can you imagine... (Score:2)
Website down for two weeks (Score:3, Funny)
That would constitute vacation, something of which I have not been familiar with in some time. So, no, I cannot imagine that.
Re:Website down for two weeks (Score:1)
That would constitute vacation,
Not if you are one of the IT department, I am really sure the closer thing to vacation you will get is a camping tent and sleeping bag where your traspassed server is.
Re:Website down for two weeks (Score:3, Funny)
Re:Twiki breached! Rodgers upset. (Score:3, Funny)
Actually, it's Rogers (no "d"). From Wikipedia,
OK, let's have a show of hands: how many of you guys around here do this as well?
Come on...
Re:Twiki breached! Rodgers upset. (Score:1)
Here comes the trolls! (Score:3, Informative)
All software and therefore all websites contain vulnerabilities.
The advantage of OSS is that these security holes are fixed promptly.
Thanks to someone posting the origional email announcement we know that this breach was due to poor server administration in that they didn't keep their software patched up to the latest version. This vulnerability is probably fixed in the latest TWiki releases being that someone is out there exploiting it.
Re:Here comes the trolls! (Score:2)
Re:Here comes the trolls! (Score:2)
Re:Here comes the trolls! (Score:2)
Re:Here comes the trolls! (Score:4, Interesting)
Yep, agreed.
Same as the majority * of Microsoft hacks. People not changing their SQL Server sa password from the default, or not applying the patch that blocks that particulary vulnerability that was released by Microsoft six months ago, or...
* Note: I fully expect someone to come up and say "but what about...". That's why I chose that phrasing. I'm not arguing Microsoft is perfect, and you can certainly argue whether open-source means you get the advantage of transparency **, or whatever your retort may be. But my contention is that the majority of hacks of Microsoft products come down to poor server administration.
** Which advantage is also extended to the hackers, of course.
Re:Here comes the trolls! (Score:2)
Re:Here comes the trolls! (Score:1)
There's no difference that I can see whether or not it's integrated into the OS, the only thing that matters is that arbitrary code can be executed. This hasn't been readily demonstrated in Firefox, y
Re:Here comes the trolls! (Score:1)
Now some people will cling to various insecure software, but when you have a stream of fixe
Dupe! (Score:5, Funny)
We're done with TWiki (Score:5, Informative)
I also recently had my TWiki [twiki.org]-based wiki farm [pdx.edu] broken into, for the 3rd time in 4 years, despite trying to stay up to date at least with Debian releases. Fortunately, I had each wiki set up to run suexec as an individual user, so the damage was reasonably well contained.
Since TWiki's security problems seem intractable (giant Perl codebase that's very difficult to audit and doesn't seem to have been designed to handle security) I decided that enough is enough and followed freedesktop.org [freedesktop.org]'s lead in moving the whole farm to MoinMoin [wikiwikiweb.de]. MoinMoin is written in Python rather than Perl, and seems to be better thought out in terms of security, although I had to hack up the source some to get what I wanted. Some open source migration tools will be made available shortly.
I wouldn't recommend to anyone that they run a publically-viewable TWiki installation at this point.
Re:We're done with TWiki (Score:1)
Re:We're done with TWiki (Score:3, Informative)
TWiki is not part of any official Debian release. The current round of bugs was fixed for the twiki package in unstable in March 2005, in version 20040902-2.
Since TWiki's security problems seem intractable (giant Perl codebase that's very difficult to audit and doesn't seem to have been designed to handle security)
Actually, it's not that bad. External proce
Re: That robustness patch of yours (Score:2, Offtopic)
While it is certainly easy to use regular expressions in this manner to produce code that qualifies as poor engineering from a sec
Re: That robustness patch of yours (Score:2)
how is Python more secure than perl? (Score:1)
Does TWiki even use taintperl? Not that that provides much more than minimal security help anyway.
Re:how is Python more secure than perl? (Score:2)
Genuine answer: because the code is, _in general_, more readable. Of course it's possible to write perfectly clear perl or horribly obfuscated python, but in general python code is far more readable than perl code. And that makes it far easier to check it's doing what it should do.
Re:how is Python more secure than perl? (Score:1)
While I agree with parent that Python code tends to be more readable than Perl code, I'd like to amplify that we really aren't moving from Perl to Python, but from TWiki to MoinMoin. I believe that MoinMoin is more secure because it has a far better security record, because I've watched freedesktop.org, which is a target, run successfully for a while, and because I was able to read, audit, and modify the authentication code at the heart of MoinMoin to suit our purposes quickly.
I'm not thrilled with MoinMo
Re:We're done with TWiki (Score:2)
I agree that it's best to ditch twiki, although SELinux is also good for damage limitation.
Re:We're done with TWiki (Score:3, Interesting)
It's all about the right security process (Score:1)
The TWiki community has a well established security alert process [twiki.org], summarised at TWikiSecurity [twiki.org]. The security team acted very quickly on the last incident, as documented in the timeline [twiki.org].
Like other web based software, TWiki is safe to use on public sites if site administrators establish the right security process and act quickly on an incident.
Re:It's all about the right security process (Score:1)
The last two times I discovered we were hit, I got a security alert a few days later. This may indeed be a very quick response, but it doesn't solve my problem. :-)
I don't agree that TWiki is safe to use on public sites in its current form. The code base is so diffuse, complex, and difficult to audit that I expect more serious incidents in the near future. Responding to incidents is not the same as proactively hardening the software to prevent them. Perhaps the "Dakar" release will solve the problems--
Re:We're done with TWiki (Score:4, Informative)
I also recently had my TWiki-based wiki farm broken into, for the 3rd time in 4 years, despite trying to stay up to date at least with Debian releases. Fortunately, I had each wiki set up to run suexec as an individual user, so the damage was reasonably well contained.
I'm running the TWiki Debian packages (from Unstable) but follow the security mailing list [twiki.org] and fortunately have patched (just) in time (so far). The first [twiki.org] of the two recent vulnerabilities brought an attempted attack on my server around 12 hours after getting the initial email warning.
Since TWiki's security problems seem intractable (giant Perl codebase that's very difficult to audit and doesn't seem to have been designed to handle security) I decided that enough is enough and followed freedesktop.org's lead in moving the whole farm to MoinMoin
It's probably not much consolation, but the upcoming Dakar [twiki.org] release features a much revised code base with security [twiki.org] in mind.
Why is this? (Score:2)
Perl, not having a default repr() method that spits out eval()-able code doesn't encourage that particular brand of insecurity. Also, one would think that taint mode would prevent many similar web programming bugs. (No, taint mode isn't a panacea, but it's be
I found this out yesterday... (Score:2)
The difference between Mozilla and Firefox... (Score:1)
Er... correction (Score:1)
Re:The difference between Mozilla and Firefox... (Score:1, Insightful)
Re:The difference between Mozilla and Firefox... (Score:2)
So any tune you imagined was one inside your own head.
Re:The difference between Mozilla and Firefox... (Score:2, Informative)
Re:The difference between Mozilla and Firefox... (Score:1)
The culprit is..... (Score:3, Funny)
Non News (Score:2)
Sure, its sad we have reached this point, but its a sign of society in general.
When was the last time a home break-in was on the front page of the paper? ( unless it was someone 'special' of course.. )
Crime has just become part of the 'background noise' in life today.. Almost like the world of marketing has..
Re:Non News (Score:1)
Re:Non News (Score:2)
What the hell does it have to do with microsoft or political orientation? ( to me, nothing )
Well at least ... (Score:1)
Employee promises from the last incident. (Score:1, Flamebait)
Re:Employee promises from the last incident. (Score:2)
It doesn't sound to me like you are an ardent OSS supporter - you don't seem to understand what it's about at all. I'll give you fanboy, though.
Re:Employee promises from the last incident. (Score:2)
Re:Employee promises from the last incident. (Score:1)
Re:Employee promises from the last incident. (Score:2)
You go ahead and do that. But don't forget to bring a shovel. You'll need it to dig her rotten corpse out of the ground.
Re:Employee promises from the last incident. (Score:2)
Re:Employee promises from the last incident. (Score:2)
If somebody were to volunteer their cleaning services at a church, for instance, and proceeded to repeatedly damage the pews and the flooring, then they would be politely asked to stop volunteering. It's time for SpreadFirefox to to the same, so a
TWiki got safe with the new release (Score:1)
Obviously... (Score:1)
Not TWiki! (Score:1)
Re:Relief (Score:1)
Re:Look out now for the FUD (Score:2)
Re:Look out now for the FUD (Score:4, Funny)
Look out i gatta go back to clicking up a storm. They are paying me to surf now
Re:Sensationalism (Score:2, Interesting)
Re:Sensationalism (Score:1)
Cheers