ftp/proftpd 1.3.3c with a version which contained a backdoor.

2010-12-02 Thread Ivan Klymenko
Hello, people!
What do you think is it worth to pay attention to these events:
http://sourceforge.net/mailarchive/message.php?msg_name=alpine.DEB.2.00.1012011542220.12930%40familiar.castaglia.org

and that in this case needs to be done with the port ftp/proftpd itself?

Thanks!
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: ftp/proftpd 1.3.3c with a version which contained a backdoor.

2010-12-02 Thread Ivan Klymenko
В Thu, 2 Dec 2010 23:22:06 +0200
Ivan Klymenko fi...@ukr.net пишет:

 Hello, people!
 What do you think is it worth to pay attention to these events:
 http://sourceforge.net/mailarchive/message.php?msg_name=alpine.DEB.2.00.1012011542220.12930%40familiar.castaglia.org
 
 and that in this case needs to be done with the port ftp/proftpd
 itself?
 
 Thanks!

Check vulnerability of your server, you can by using the following
command sequence:

$ telnet 1.2.3.4 21
   Trying 1.2.3.4...
   Connected to 1.2.3.4
   Escape character is '^]'.
   220 ProFTPD 1.3.3c Server (ProFTPD Default Installation) [1.2.3.4]

   HELP ACIDBITCHEZ
 
   id ;
 
   uid=0(root) gid=0(root) groups=0(root),65534(nogroup)
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: ftp/proftpd 1.3.3c with a version which contained a backdoor.

2010-12-02 Thread Chuck Swiger
On Dec 2, 2010, at 1:22 PM, Ivan Klymenko wrote:
 What do you think is it worth to pay attention to these events:
 http://sourceforge.net/mailarchive/message.php?msg_name=alpine.DEB.2.00.1012011542220.12930%40familiar.castaglia.org
 
 and that in this case needs to be done with the port ftp/proftpd itself?

Presumably/hopefully, the proftpd tarball which contained the backdoor would 
fail to match the distinfo for the port:

SHA256 (proftpd-1.3.3c.tar.bz2) = 
ea7f02e21f81e6ce79ebde8bbbd334bd269a039ac9137196a35309f791b24db1
SIZE (proftpd-1.3.3c.tar.bz2) = 4166609

Checking, the tarball you now fetch is the one which matches their md5 and 
GnuPG signing from the link above...

Regards,
-- 
-Chuck

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: ftp/proftpd 1.3.3c with a version which contained a backdoor.

2010-12-02 Thread Rob Farmer
On Thu, Dec 2, 2010 at 14:00, Chuck Swiger cswi...@mac.com wrote:
 Presumably/hopefully, the proftpd tarball which contained the backdoor would 
 fail to match the distinfo for the port:

 SHA256 (proftpd-1.3.3c.tar.bz2) = 
 ea7f02e21f81e6ce79ebde8bbbd334bd269a039ac9137196a35309f791b24db1
 SIZE (proftpd-1.3.3c.tar.bz2) = 4166609

 Checking, the tarball you now fetch is the one which matches their md5 and 
 GnuPG signing from the link above...

For several hours on Wednesday the distinfo was updated to the
compromised version (it has been reverted), so anyone who updated this
port recently should check their system.

-- 
Rob Farmer
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: ftp/proftpd 1.3.3c with a version which contained a backdoor.

2010-12-02 Thread Chuck Swiger
On Dec 2, 2010, at 2:55 PM, Rob Farmer wrote:
 Checking, the tarball you now fetch is the one which matches their md5 and 
 GnuPG signing from the link above...
 
 For several hours on Wednesday the distinfo was updated to the
 compromised version (it has been reverted), so anyone who updated this
 port recently should check their system.

I see-- that's useful information to be aware of.  Hopefully port maintainers 
practice a bit more wariness about distfiles changing unexpectedly; while it's 
common enough that people re-roll tarballs for whatever reason, it seems like 
there have been more incidents of reference sites getting owned...

Regards,
-- 
-Chuck

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org


Re: ftp/proftpd 1.3.3c with a version which contained a backdoor.

2010-12-02 Thread Ade Lovett

On Dec 02, 2010, at 17:56 , Chuck Swiger wrote:
 On Dec 2, 2010, at 2:55 PM, Rob Farmer wrote:
 
 For several hours on Wednesday the distinfo was updated to the
 compromised version (it has been reverted), so anyone who updated this
 port recently should check their system.
 
 I see-- that's useful information to be aware of.  Hopefully port maintainers 
 practice a bit more wariness about distfiles changing unexpectedly; while 
 it's common enough that people re-roll tarballs for whatever reason, it seems 
 like there have been more incidents of reference sites getting owned...

If ya'll are _absolutely_ certain that the current distfile is correct and not 
compromised then I would _strongly_ recommend that you bump PORTREVISION to 
make it absolutely obvious that folks see this.

-aDe

___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to freebsd-ports-unsubscr...@freebsd.org