Language Selection

English French German Italian Portuguese Spanish

Red Hat's security issue

Filed under
Linux
Security

Last month, Red Hat issued a security bulletin. Not all that went on is clear, but it seems that the servers used to develop and distribute Fedora and Red Hat were accessed by a person with criminal intent. The perpetrator created trap-door versions of the SSH (remote login program) packages that would compromise the security of Red Hat's customers, and signed them with Fedora's cryptographic key. These packages were made available via Fedora archive and they may (I've not proof) have reached some number of Fedora customers. Obviously they were intended to be widely distributed and to compromise the security of all Red Hat and Fedora systems. Red Hat issued a script that users can run to detect the compromised packages.

But there are continuing problems with Red Hat's handling of the situation.

Best practice of computer security professionals is to fully disclose what went wrong and how you're preventing it from happening again. This tells customer security officers what they need to audit the security practices of their vendor, and to secure their own facilities. The worst practice, for which Microsoft is the prototype, is to stay mum and not admit any problems.

Red Hat's being mum. Fedora's being forced to be mum, because their own board has not been given full details and of course they are mostly controlled by Red Hat.

Full Post




Also:

Security breaches bring out the proprietary attitude in all of us. When security is breached we instinctively hide the details, and build a metaphorical police line around it, telling onlookers to move along.

The security attitude runs counter to the open source attitude. Open source demands that bugs be seen and lessons shared. The security attitude fears this release of information because the evil doers might get it.

With that in mind let’s move to the umbrage of Bruce Byfield during what Slashdot termed last month’s Fedora-Red Hat crisis.

Fedora and our security attitude


More in Tux Machines

today's howtos

Android Leftovers

Embedded Linux Keeps on Growing, IoT Next Big Win

As I noted at the beginning of this year, open source has won, even if it's not finished. That's easy to show at the top end, since Linux currently runs 485 of the top 500 supercomputers in the world. But at the other end of the spectrum, data has been harder to come by. That makes a new post on Linux.com reporting on the embedded sector particularly welcome. Here's the key finding. Read more

Samsung Galaxy S6 and S6 Edge Review: All Hail the New Android Smartphone Kings

Samsung’s Galaxy S6 and Galaxy S6 Edge flagship phones are finally here. They are beautiful phones (unlike the uninspired Galaxy S5). The S6 Edge, with its unique curved screen, is especially eye-catching. But the S6 and S6 Edge have more than just good looks. Both pack powerful processors, gorgeous 5.1-inch displays, and the best smartphone cameras on the market. Throw in a new mobile payment system that lets you use your S6 anywhere you can use a standard credit card, and the Galaxy S6 and S6 Edge are the new Android smartphone kings. Read more