While all of the below sounds great, how about before we cut
everybody off or make it a bit more difficult to do what we need to
get done as committers, that we setup the infrastructure so that I
DON'T need shell access at all to do what I need to do?
This includes items like deploying artifacts to the appropriate
places, staging p2 repositories, and requesting/creating hudson
related jobs.
I know that their is work undergoing for a redesign portal, I'd love
to see some of the functionality that we used to have to do via the
shell access moved to the Portal. Eliminate the need for Shell
access entirely, otherwise this is just a bandaid, and if somebody
really wants to get into the servers, they'll find a way to do it.
Dave
On 09/28/2011 10:56 AM, Denis Roy wrote:
Now that some of the dust has settled on the
recent security issues, I thought it might be good to provide a
bit more insight into what your evil webmasters have done, and
what they have planned, in an effort to maintain high levels of
security.
What are you so afraid of?
My biggest fear is that someone obtains root access on our
servers, potentially exposing our binary downloads, source code,
code signing certificate, SSL certificates, private information of committers, users and member organizations, and more.
Why strip everyone's shell access?
Local shell access is the easiest way
to install software that exploits vulnerabilities to obtain root
access. Although we trust our committers, active shell access
is, and has always been, our biggest cause for concern.
Why restrict the shell to build.eclipse.org and not
dev.eclipse.org?
dev|git.eclipse.org run a patched kernel to
support the large number of groups that many committers belong
to, whereas build.eclipse.org uses the Novell-shipped kernel,
making it easier and faster to deploy a new kernel on build.
But I use keys to log in, isn't that safe?
Your private key is stored in a file in a standard location
on your computer, and is available to any piece of software (and
malware) that is running as your user account. If someone
obtains a committer's private key, they can log in to our
servers unchallenged and undetected, where they may have full
shell access for weeks, months or years.
So how will you keep our Shell-Enabled accounts safe from
key (or password) theft?
A simple mechanism is now tracking the IP networks from
which shell accounts are used on build.eclipse.org. Soon, when
we're confident it has sufficiently learned your login patterns,
that mechanism will block a successful login from an
unknown network. An email will be sent out to you, and
the simple act of responding to that email will place the
unknown network in the trusted list for all.
If the trusted network is not used by anyone for more than two
months, it is no longer trusted.
This mechanism only applies to committers with full shell
access logging into build.eclipse.org only. SCM
operations occurring on dev|git.eclipse.org will not be
subjected to this scrutiny since there is no shell access on
those servers.
Typical use case I:
While on vacation in the Bahamas, David Williams is committing
from a hotel lobby. Although David has a full shell, his
commits are unchallenged on dev.eclipse.org. After successfully
opening an SSH shell on build, he is instantly kicked out and
notified via email. After replying to the email, his subsequent
logins succeed. Weeks later, back in the USA, David receives
an unexpected notification that his account was used
successfully from a computer in Spain. He then realizes he
should not have left his computer unattended while ordering that
last margarita in the Bahamas, and proceeds to inform webmaster
that his private key has been compromised.
The would-be hacker in Spain is left with a closed SSH session,
and can no longer connect to any eclipse.org server.
Typical use case II:
While at EclipseCon Europe, an elite group of hackers posing as
Obeo committers proceed to distract the webmaster with endless
praise and numerous free drinks, and use his laptop. Although
none of the impostors speak French, the webmaster is unaware
that his private key is now compromised. The next day, the
webmaster awakens to a headache and email notifications that
usage of his account has been blocked. A compromise is avoided,
and the impostors frustratingly return empty handed.
We estimate this mechanism will cause very minimal
inconvenience to you, while offering us excellent protection
against private key and password theft.
Thanks for reading. If you have any questions or concerns,
please contact Matt and I at webmaster@xxxxxxxxxxx.
--
Denis Roy

_______________________________________________
cross-project-issues-dev mailing list
cross-project-issues-dev@xxxxxxxxxxx
https://dev.eclipse.org/mailman/listinfo/cross-project-issues-dev
|