kernel.org pwned

“Security people are leeches.” © Linus “3.0, why not” Torvalds

... and it really shows on his servers. And what can be told about the “staff”, and the kernel developers? They have
no idea how the attacker gained root privileges. Even the first line of mail on this topic to ever see daylight was:

“As you can guess from the subject line, I've not had what many would consider a "good" day. “

Um... yes I care about your day..!?? NOT. Write a blog, lamer!

“Files belonging to ssh (openssh, openssh-server and openssh-clients) were modified and running live”


Well, I run my own filesystem checksumming security program, so would have guessed that kernel.org servers have one too.
NOT.

“A trojan startup file was added to rc3.d”

So you guys don’t even monitor newly appeared files. What the fuck?

“System is being verified from backups, signatures, etc.”


By fucking monkeys like you? Fat good it does!

And for Linus, the honorable thing to do would be to pack up his cancerous, bloated shit (in his words: “kernel”), and leave the world for good. Well that just won’t happen. Linus, being the arrogant prick he is, will be unwavering in his corrupted view of security being a second rate priority,
well beyond the utmost goal of commiting more shit into an OS that no serious administrator would ever use nowadays. And this means more lulz like this coming! \o/

<ggergelz> amugy kulon vicces, hogy a gitben vannak eszkozok a history multbeli modositgatasara :D
<ggergelz> szoval vajon a git repokban milyen finomsagokat hagyhattak hatra

11/09/01 :: nevar forget

[
announcement mail ]
[
buhera.blog.hu ]
[
hup ]
[
theregister ]