Language Selection

English French German Italian Portuguese Spanish

Gentoo

Security Issues at Gentoo Narrowed Down to Crappy Password

Filed under
Gentoo
Security
  • Linux experts are crap at passwords!

    Fortunately, Gentoo’s GitHub respository wasn’t the primary source for Gentoo code, and few, if any, Gentoo users were relying on it for software updates.

  • Gentoo publishes detailed report after its GitHub was compromised

    You may have seen the news towards the end of June that Gentoo, a fairly advanced Linux distribution, had its GitHub repository compromised after an attacker managed to gain access to one of the connected accounts. Now, Gentoo has published a comprehensive report about the incident and it turns out that the gaff was due to not following rudimentary security tips.

  • Weak Admin Password Caused Compromise of Gentoo GitHub repository

    Gentoo have finished their investigation of the hack that affected their project last week on GitHub. The point of vulnerability has turned out to be a weak Administrator password. upon compromise the hackers added the Linux killer command “rm -rf /” so when users cloned the project to their computers all their data will be erased.

Microsoft, the NSA, and GitHub

Filed under
Gentoo
Microsoft
Security
  • Gentoo hacker's code changes unlikely to have worked

    Linux distribution Gentoo's maintainers say attempts by attackers last week to sabotage code stored on Github is unlikely to have worked.

    Gentoo's Github account was compromised in late June.

    The attacker was able to gain administrative privileges for Gentoo's Github account, after guessing the password for it.

    Gentoo's maintainers were alerted to the attack early thanks to the attacker removing all developers from the Github account, causing them to be emailed.

  • NSA Exploit "DoublePulsar" Patched to Work on Windows IoT Systems

    An infosec researcher who uses the online pseudonym of Capt. Meelo has modified an NSA hacking tool known as DoublePulsar to work on the Windows IoT operating system (formerly known as Windows Embedded).

    The original DoublePulsar is a hacking tool that was developed by the US National Security Agency (NSA), and was stolen and then leaked online by a hacking group known as The Shadow Brokers.

    At its core, DoublePulsar is a Ring-0 kernel mode payload that acts like a backdoor into compromised systems. DoublePulsar is not meant to be used on its own, but together with other NSA tools.

  • Predictable password blamed for Gentoo GitHub organisation takeover [Ed: when Microsoft takes over the NSA gets all these passwords. (NSA PRISM)]

    Gentoo has laid out the cause and impact of an attack that saw the Linux distribution locked out of its GitHub organisation.

    The attack took place on June 28, and saw Gentoo unable to use GitHub for approximately five days.

    Due a lack of two-factor authentication, once the attacker guessed an admin's password, the organisation was in trouble.

Security: Open Source Security Podcast and Inaccurate Gentoo Coverage

Filed under
Gentoo
Security
  • Open Source Security Podcast: Episode 103 - The Seven Properties of Highly Secure Devices

    We take a real world view into how to secure our devices. What works, what doesn't work, and why this list is actually really good.

  • Github code repository for Gentoo Linux hacked [Ed: Lots of inaccuracies here]

    The Gentoo Linux distribution's Github repository was hacked last June 28, with the attackers modifying the code there.

    Github is a repository for all sorts of source code projects in a variety of programming languages. Gentoo Linux is one such project, stored in Github.

    Gentoo Linux administrators updated users as soon as the issue was found out.

  • Gentoo warning after GitHub hack [Ed: Crack, not "hack"]

    A key Gentoo Linux source code repository should be considered compromised after “unknown individuals” gained access to Gentoo’s Github organisation.

    In an email to the Gentoo announcement list, developer Alec Warner said that the individuals had seized control of the GitHub Gentoo organisation “and modified the content of repositories as well as pages there”.

Gentoo Needs to Delete GitHub

Filed under
Gentoo
Security
  • Gentoo GitHub mirror hacked and considered compromised

    Linux distribution Gentoo has had its GitHub mirror broken into and taken over, with GitHub pages changed and ebuilds replaced.

    In an alert, Gentoo said the attacker gained control of the Github Gentoo organisation at June 28, 20:20 UTC.

    "All Gentoo code hosted on github should for the moment be considered compromised," the alert said.

  • Et tu, Gentoo? Horrible gits meddle with Linux distro's GitHub code

    If you have fetched anything from Gentoo's GitHub-hosted repositories today, dump those files – because hackers have meddled with the open-source project's data.

    The Linux distro's officials sounded the alarm on Thursday, revealing someone managed to break into its GitHub organization account to modify software and webpages.

    Basically, if you downloaded and installed materials from Gentoo via GitHub, you might be compromised by bringing in malicious code. And until the all clear is given, you should avoid fetching anything from the project's 'hub org account.

    "Today, 28 June, at approximately 20:20 UTC unknown individuals have gained control of the Github Gentoo organization, and modified the content of repositories as well as pages there," Gentoo dev Alec Warner said in a bulletin.

  • Gentoo Linux GitHub organisation hacked, content modified

    The GitHub organisation of the Gentoo Linux distribution has been compromised and the project behind Gentoo is warning users not to use code from this source.

    In a statement, the Gentoo leadership said some unknown individuals had gained control of the GitHub Gentoo organisation on 28 June at 20.20 UTC and modified the content and pages.

    Gentoo is a Linux distribution meant for advanced users. The source is compiled locally depending on user preferences and is often optimised for specific hardware.

Gentoo-Based Porteus Kiosk 4.7 Brings More Mitigations Against Spectre Flaws

Filed under
Gentoo

Powered by the long-term supported Linux 4.14.50 kernel, Porteus Kiosk 4.7.0 is the second release of the operating system in 2018 and comes five months after version 4.6 to introduce more mitigations against the Spectre security vulnerabilities, though the next-gen Spectre flaws require microcode firmware updates for Intel CPUs.

"Newly discovered "Spectre Next Generation" vulnerabilities require updated microcode from Intel which is not available yet. Please consider enabling automatic updates service for your kiosks to receive latest fixes and patches as soon as they become available," reads today's announcement.

Read more

The story of Gentoo management

Filed under
Gentoo

I have recently made a tabular summary of (probably) all Council members and Trustees in the history of Gentoo. I think that this table provides a very succinct way of expressing the changes within management of Gentoo. While it can’t express the complete history of Gentoo, it can serve as a useful tool of reference.

What questions can it answer? For example, it provides an easy way to see how many terms individuals have served, or how long Trustee terms were. You can clearly see who served both on the Council and on the Board and when those two bodies had common members. Most notably, it collects a fair amount of hard-to-find data in a single table.

Read more

A short history of Gentoo copyright

Filed under
Gentoo
Legal

As part of the recent effort into forming a new copyright policy for Gentoo, a research into the historical status has been conducted. We've tried to establish all the key events regarding the topic, as well as the reasoning behind the existing policy. I would like to shortly note the history based on the evidence discovered by Robin H. Johnson, Ulrich Müller and myself.

Read more

Encryption in Gentoo and GNOME

Filed under
Gentoo
GNOME
  • On OpenPGP (GnuPG) key management

    Over the time, a number of developers have had problems following the Gentoo OpenPGP key policy (GLEP 63. In particular, the key expiration requirements have resulted in many developers wanting to replace their key unnecessarily. I’ve been asked to write some instructions on managing your OpenPGP key, and I’ve decided to go for a full blog post with some less-known tips. I won’t be getting into detailed explanations how to use GnuPG though — you may still need to read the documentation after all.

    [...]

    Signing keys are used to sign data, i.e. to prove its authenticity. Using multiple signing subkeys is rather trivial — you can explicitly specify the key to use while creating a signature (note that you need to append ! to key-id to force non-default subkey), and GnuPG will automatically use the correct subkey when verifying the signature. To reduce the wear of your main signing subkey, you can create a separate signing subkey for Gentoo commits. Or you can go ever further, and have a separate signing subkey for each machine you’re using (and keep only the appropriate key on each machine).

  • Fractal Hackfest, Strasbourg (day 2)

    The encryption is a needed feature but encryption is hard to do in rooms. Matrix uses public-key cryptography, for rooms they are using Megolm, that's a protocol to exchange encrypted messages with more than one and share that message keys in a one-to-one secure communication.

    I don't know a lot about this E2E because for me it's more important to have the client working with a basic functionality before the encryption. So you should read the official doc because maybe this that I'm writing here is completely wrong.

    To do all this E2E key sharing, client side encryption and communication, Riot has three different implementations of the same lib, so they have this code in the JavaScript SDK, the same ported to iOS version in ObjectiveC and the same ported to Android in Java. Below this lib there's the libolm that does the real encryption.

Copyright 101 for Gentoo contributors

Filed under
Gentoo
Legal

While the work on new Gentoo copyright policy is still in progress, I think it would be reasonable to write a short article on copyright in general, for the benefit of Gentoo developers and contributors (proxied maintainers, in particular). There are some common misconceptions regarding copyright, and I would like to specifically focus on correcting them. Hopefully, this will reduce the risk of users submitting ebuilds and other files in violation of copyrights of other parties.

First of all, I’d like to point out that IANAL. The following information is based on what I’ve gathered from various sources over the years. Some or all of it may be incorrect. I take no responsibility for that. When in doubt, please contact a lawyer.

Secondly, the copyright laws vary from country to country. In particular, I have no clue how they work across two countries with incompatible laws. I attempt to provide a baseline that should work both for US and EU, i.e. ‘stay on the safe side’. However, there is no guarantee that it will work everywhere.

Read more

Redcore Linux Makes Gentoo Easy

Filed under
Linux
Gentoo

Raise your hand if you’ve always wanted to try Gentoo Linux but never did because you didn’t have either the time or the skills to invest in such a challenging installation. I’m sure there are plenty of Linux users out there not willing to admit this, but it’s okay, really; installing Gentoo is a challenge, and it can be very time consuming. In the end, however, installing Gentoo will result in a very personalized Linux desktop that offers the fulfillment of saying, “I did it!”

So, what’s a curious Linux user to do, when they want to experience this elite distribution? One option is to turn to the likes of Redcore Linux. Redcore does what many have tried (and few have succeeded in doing) in bringing Gentoo to the masses. In fact, Sabayon Linux is the only other distro I can think of that’s truly succeeded in bringing a level of simplicity to Gentoo Linux that many users can enjoy. And while Sabayon is still very much in active development, it’s good to know there are others attempting what might have once been deemed impossible.

Read more

Syndicate content

More in Tux Machines

Kernel and Graphics: PDS, VKMS and Nouveau

  • PDS 0.98s release
    PDS 0.98s is released with the following changes 1. Fix compilation issue on raspberry pi. 2. Minor rework and optimization on balance code path. 3. Fix wrong nr_max_tries in migrate_pending_tasks. This is mainly a bug fix and minor optimization release for 4.17. The rework of balance code doesn't go well, it actually make more overhead than current implement. Another rework which based on current implement is still on going, hopefully be included in next release.
  • PDS-MQ CPU Scheduler Revised For The Linux 4.17 Kernel With Minor Optimizations
    Alfred Chen announced this week the release of PDS-mq 0.98s, his latest patch-set of this CPU scheduler against the Linux 4.17 upstream code-base and includes minor optimization work and bug fixes. The PDS scheduler stands for the "Priority and Deadline based Skiplist multiple queue scheduler" that is derived from Con Kolivas' former BFS scheduler with Variable Run Queue (VRQ) support. PDS design principles are to be a simple CPU process scheduler yet efficient and scalable. PDS-mq differs from Con Kolivas' current MuQSS scheduler.
  • Add infrastructure for Vblank and page flip events in vkms simulated by hrtimer
    Since the beginning of May 2018, I have been diving into the DRM subsystem. In the beginning, nothing made sense to me, and I had to fight hard to understand how things work. Fortunately, I was not alone, and I had great support from Gustavo Padovan, Daniel Vetter, Haneen Mohammed, and the entire community. Recently, I finally delivered a new feature for VKMS: the infrastructure for Vblank and page flip events. At this moment, VKMS have regular Vblank events simulated through hrtimers (see drm-misc-next), which is a feature required by VKMS to mimic real hardware [6]. The development approach was entirely driven by the tests provided by IGT, more specifically the kms_flip. I modified IGT to read a module name via command line and force the use of it, instead of using only the modules defined in the code (patch submitted to IGT, see [1]). With this modification in the IGT, my development process to add a Vblank infrastructure to VKMS had three main steps as Figure 1 describes.
  • The State Of The VKMS Driver, Preparations For vBlank & Page Flip Events
    One of the exciting additions to look forward to with the upcoming Linux 4.19 kernel cycle is the virtual "VKMS" kernel mode-setting driver. The driver is still a work-in-progress, but multiple developers are working on it.
  • NIR Continues To Be Prepped For OpenCL Support
    Longtime Nouveau contributor Karol Herbst who joined Red Hat several months ago has been working on Nouveau NIR support as stepping towards SPIR-V/compute support and this summer the work very much remains an active target.
  • Nouveau Gallium3D Moves Closer Towards OpenGL 4.5 Compliance
    While the RadeonSI and Intel i965 Mesa drivers have been at OpenGL 4.5 compliance for a while now, the Nouveau "NVC0" Gallium3D driver has been bound to OpenGL 4.3 officially. This Nouveau Gallium3D driver for NVIDIA "Fermi" graphics hardware and newer has effectively supported all of the OpenGL 4.4/4.5 extensions, but not officially. Originally the NVC0 problem for OpenGL 4.4 and newer was the requirement of passing the OpenGL Conformance Test Suite (CTS), which at first wasn't open-source. But now The Khronos Group has made it available to everyone as open-source. Additionally, the proper legal wrangling is in place so the Nouveau driver could become a conforming Khronos adopter under the X.Org Foundation without any associated costs/fees with Nouveau being purely open-source and primarily considered a community driver.

DistroWatch The Best Website For Distro Hoppers

The DistroWatch features release announcements of new versions of hundreds of Linux and other distributions. It does host reviews of distros, podcasts, and newsletters. DistroWatch first published by Ladislav Bodnar, the founder, and maintainer, on May 31, 2001. DistroWatch initially focused on Linux distributions. But later based on user requests, it went on adding different flavors of operating systems like BSD family, Android x86, Oracle Solaris, MINIX, and Haiku etc. The DistroWatch presents detailed information at one place in a very convenient manner. At the time of writing this article, the DistroWatch hosted information of more than 300 active distributions (referring the list of distros populated under drop-down feature on the first page of the DistroWatch) and more than hundred in queue. It is said that the DistroWatch lives out of advertising and donation. LinuxCD.org is the first to advertise on the DistroWatch site. Read more

Ubuntu 18.04 LTS and 16.04 LTS Amazon Linux AMIs Now Support Amazon's SSM Agent

As of July 2018, Amazon's Linux AMIs (Amazon Machine Images) that are based on either the Ubuntu 16.04 LTS (Xenial Xerus) or Ubuntu 18.04 LTS (Bionic Beaver) operating systems now come pre-installed with the AWS Systems Manager Agent (SSM Agent), an Amazon software designed to run on hybrid or Amazon EC2 instances in public and private clouds on AWS (Amazon Web Services). "With this new feature release, AWS Systems Manager Agent is installed by default on all instances launched or built from Ubuntu 16.04 LTS (2018.07 and later) and 18.04 LTS (all versions) AMIs," said Amazon. "By having the agent pre-installed, you can quickly start using AWS Systems Manager features such as Run Command, State Manager, Inventory and Patch Manager." Read more

today's howtos