1 |
On Thursday 25 March 2004 18:33, Chris Gianelloni wrote: |
2 |
> |
3 |
> > Why? There are more gentoo developers than rsync servers. Their machines |
4 |
> > do more than rsync servers. What reason is there to believe that a |
5 |
> > compromise of an rsync server is more likely than compromise of a |
6 |
> > developer machine? |
7 |
> |
8 |
> Well, all the rsync servers have at least ONE externally addressable and |
9 |
> reachable service which could be exploited. Many developer machines are |
10 |
> behind firewalls or have no listening services. It is *much* harder to |
11 |
> compromise a machine which isn't facing the Internet than one that |
12 |
> definitely is accessible. |
13 |
|
14 |
Do you believe that this is the case for all developers? Even if it were, |
15 |
there are many programs other than daemons that connect to the internet that |
16 |
may contain exploitable code. Web browsers, email, irc, ftp, cvs, ssh, |
17 |
usenet, p2p; developers use these programs often, and many exploits have been |
18 |
found in client implementations in the past. Know that a developer checks out |
19 |
cvs from some other project? Hack the server, and when his ip address |
20 |
connects, send trojan code. Then there are physical attacks; is a developer |
21 |
at your uni? Pick his door lock and install a hardware key logger. |
22 |
|
23 |
All of these things might individually be less likely than a direct attack, |
24 |
but together the possibility that one small security breach, for a single |
25 |
developer, might occur is more than comparable to the possibility that the |
26 |
rsync code, which has been extensively audited, might contain an external |
27 |
exploit. |
28 |
|
29 |
-- |
30 |
gentoo-dev@g.o mailing list |