Commit: a67f2d1ebb79e8dc2ef1eb1a93b3e3e014031143 Author: Hannes Magnusson <bj...@php.net> Thu, 24 Oct 2013 20:56:07 -0500 Parents: 10af1e0af51d2955c999c8178cb3f11b84cbd8cf Branches: master
Link: http://git.php.net/?p=web/php.git;a=commitdiff;h=a67f2d1ebb79e8dc2ef1eb1a93b3e3e014031143 Log: Add a news entry about the current status, written by Rasmus Changed paths: M archive/archive.xml A archive/entries/2013-10-24-1.xml Diff: diff --git a/archive/archive.xml b/archive/archive.xml index 8b7b4a5..530a159 100644 --- a/archive/archive.xml +++ b/archive/archive.xml @@ -9,6 +9,7 @@ <uri>http://php.net/contact</uri> <email>php-webmaster@lists.php.net</email> </author> + <xi:include href="entries/2013-10-24-1.xml"/> <xi:include href="entries/2013-10-17-1.xml"/> <xi:include href="entries/2013-10-16-1.xml"/> <xi:include href="entries/2013-10-10-2.xml"/> diff --git a/archive/entries/2013-10-24-1.xml b/archive/entries/2013-10-24-1.xml new file mode 100644 index 0000000..fc1d5ba --- /dev/null +++ b/archive/entries/2013-10-24-1.xml @@ -0,0 +1,50 @@ +<?xml version="1.0" encoding="utf-8"?> +<entry xmlns="http://www.w3.org/2005/Atom"> + <title>A quick update on the status of php.net</title> + <id>http://php.net/archive/2013.php#id2013-10-24-1</id> + <published>2013-10-24T20:55:17-05:00</published> + <updated>2013-10-24T20:55:17-05:00</updated> + <category term="frontpage" label="PHP.net frontpage news"/> + <link href="http://php.net/index.php#id2013-10-24-1" rel="alternate" type="text/html"/> + <link href="http://php.net/archive/2013.php#id2013-10-24-1" rel="via" type="text/html"/> + <content type="xhtml"> + <div xmlns="http://www.w3.org/1999/xhtml"> + <p> + On 24 Oct 2013 06:15:39 +0000 Google started saying www.php.net was hosting + malware. The Google Webmaster Tools were initially quite delayed in showing + the reason why and when they did it looked a lot like a false positive + because we had some minified/obfuscated javascript being dynamically + injected into userprefs.js. This looked suspicious to us as well, but + it was actually written to do exactly that so we were quite certain it + was a false positive, but we kept digging. + </p> + + <p> + It turned out that by combing through the access logs for static.php.net + it was periodically serving up userprefs.js with the wrong content length + and then reverting back to the right size after a few minutes. This is due + to an rsync cron job. So the file was being modified locally and reverted. + Google's crawler caught one of these small windows where the wrong file + was being served, but of course, when we looked at it manually it looked + fine. So more confusion. + </p> + + <p> + We are still investigating how someone caused that file to be changed, + but in the meantime we have migrated www/static to new clean servers. + The highest priority is obviously the source code integrity and after + a quick: + </p> + + <blockquote>git fsck --no-reflog --full --strict</blockquote> + + <p> + on all our repos plus manually checking the md5sums of the PHP distribution + files we see no evidence that the PHP code has been compromised. We have + a mirror of our git repos on github.com and we will manually check git + commits as well and have a full post-mortem on the intrusion when we have + a clearer picture of what happened. + </p> + </div> + </content> +</entry> -- PHP Webmaster List Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php