Changes between Version 1 and Version 2 of lowdown-drafts-053008
- Timestamp:
- May 31, 2008, 10:00:20 PM (17 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
lowdown-drafts-053008
v1 v2 7 7 We have ways of fending off those attacks so this wasn't going to succeed but the amount of attempts every second zapped the server's resources and we were experiencing what is called a DOS or "denial of service" attack. That means the person is using all the resources and nobody else can log in or do much with the sites on the server. 8 8 9 Jamie and Daniel Kahn Gil mor conferred and decided to reconfigure the servers to detect apparent dictionary attacks and block their IP for a period of time as soon as they start. This pre-emptive step closed those attacks down and saved the performance on all servers. Impact was hardly felt! :-)9 Jamie and Daniel Kahn Gillmor conferred and decided to reconfigure the servers to detect apparent dictionary attacks and block their IP for a period of time as soon as they start. This pre-emptive step closed those attacks down and saved the performance on all servers. Impact was hardly felt! :-) 10 10 11 11 But they led to another discovery. … … 13 13 While we were researching what to do, the Debian developers sent out an advisory about a horrible exploit. A couple of definitions are in order. 14 14 15 GNU/Debian is a free operating system that uses linux; it's the operating 16 system we use on our servers. 15 Debian is a free operating system that uses the GNU tools and the Linux kernel; it's the operating system we use on our servers. 17 16 18 17 An exploit is a piece of code that can be used by a clever attacker to get 19 18 access to a server and do damage, steal data or illicitly use resources. 20 19 21 One other definition: a Secure Sockets Layer key. An SSLkey is a long string20 One other definition: an RSA key. An RSA key is a long string 22 21 of characters that is unique to every server that provides the basis for the 23 22 server to establish a secure, encrypted connection with computers that connect 24 23 to it. 25 24 26 These software packages are developed by large numbers of people all over the world who merely contribute to them; that's what Free and Open Source Software is. They work through collaborative work systems and they communicate on-line. Most have never met.25 These software packages are developed by large numbers of people all over the world who merely contribute to them; that's what Free and Open Source Software is. Free software developers work through collaborative work systems and they communicate on-line. Most have never met each other in person. 27 26 28 27 In this case, one person filed a report and the community's leaders checked 29 and approved it. It seems that, with the Debian installedthroughout the28 and approved it. It seems that, with the most widely-distributed version of Debian installed throughout the 30 29 world, you can guess certain parts of the key that are supposed to be 31 generated ra domly. These means that, eventually, you may be able to guess the30 generated randomly. These means that, eventually, you may be able to guess the 32 31 key itself. 33 32 … … 39 38 the members. 40 39 41 We put together an approach to making the necessary changes on all three platforms: Mac, Window and Linux. And then we didhow-tos on all three, published those and sent out advisories explaining the situation. We did all that in about a day! I've never seen anything like this in all my years on the Internet.40 We put together an approach to making the necessary changes on all three major platforms: Mac, Windows and GNU/Linux. And then we wrote how-tos on all three, published those and sent out advisories explaining the situation. We did all that in about a day! I've never seen anything like this in all my years on the Internet. 42 41 43 42 https://support.mayfirst.org/wiki/ssl_host_key_changed … … 57 56 So we rerouted email to another empty server ready to handle the load. The campaign's email service continued to be affected during the four day attack but all other members' functionality was returned to normal. After four days of failure, this hacker stopped the attack and the domain was routed by to its normal server. 58 57 59 This kind of crea ctive thinking and flexibility under fire is reminiscent of what orupeople did in saving the on-line registration at the U.S. Social Forum.58 This kind of creative thinking and flexibility under fire is reminiscent of what our people did in saving the on-line registration at the U.S. Social Forum. 60 59 61 60 These two weeks were hardly routine but they were perhaps a hint of the kinds of challenges we are going to be facing in the future. Every challenge is a challenge, of course but, based on these two weeks, I think we're ready.