[ale] Security breach on kernel.org

David Tomaschik david at systemoverlord.com
Thu Sep 1 13:11:19 EDT 2011


On Thu, Sep 1, 2011 at 11:46 AM, JD <jdp at algoloma.com> wrote:
> Having the "public" ssh-keys isn't all that worrisome to me either. Am I
> missing something important?  The way that Git works is you push your
> public ssh-key to the remote server and use that for remote commands to
> the repository.  That key cannot connect back to your system. It only
> works through git or ssh commands initiated by the user. Can it be used
> to hop systems? I don't think so, not without the private key.  Sure,
> someone could swap out the git and ssh programs with Trojans. We'll know
> more about that soon enough.
<snip>
>
> Sure, I'd change my ssh-keys if I were a core contributer.  `ssh-keygen`
> isn't **that big of a deal.**  Then `ssh-copy-id` pushes the new keys to
> remote systems pretty easily.  Used it yesterday on a new VM.
>
> What am I missing?

My guess is that it's more of (as Jim alluded to) reinstalling the
pubkeys.  They don't want to copy the old ones over wholesale incase
an attacker replaced/added pubkeys to peoples authorized_keys files --
they'd just be giving him access again.

I can't think of any attack that would be made possible with a
legitimate pubkey -- after all, they're called public keys for a
reason.

(This is all just conjecture, I don't know what the thinking of the
kernel.org admins is.)

-- 
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
david at systemoverlord.com



More information about the Ale mailing list