After reading the report at
http://lists.debian.org/debian-announce/debian-announce-2003/msg00003.html
and following this newsgroup discussion, I have some very basic questions:
1) What is a "sniffed password", and how do they know the attacker used a
password that was "sniffed", rather than just stolen out of someone's
notebook?
2) Was the breakin done remotely, or by someone with physical access to
the machine or network? I thought that "sniffing" required physical access
to a network over which unencrypted data was being transferred. Are the
remote logins to Debian servers unencrypted?
3) How does an attacker with a user-level password gain root access? I
understand you can call system services that have root access, and provide
bad data in those calls that will cause buffer overflows, maybe even a
machine crash, but how does a buffer overflow allow root access? I know
there is a deep technical explanation for this, but I'm hoping someone can
explain it in simple terms, or maybe point me to a good article or book
chapter.
-- Dave
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
- Re: Debian Investigation Report after Server C... Peter Whysall
- Re: Debian Investigation Report after Server Compro... Tom
- Re: Debian Investigation Report after Server Compro... Arnt Karlsen
- RE: Debian Investigation Report after Server Compro... Preston Boyington
- RE: Debian Investigation Report after Server C... Paul Morgan
- Re: Debian Investigation Report after Serv... Paul Johnson
- Re: Debian Investigation Report after ... Greg Folkert
- Re: Debian Investigation Report after ... Karsten M. Self
- Re: Debian Investigation Report after ... Paul Morgan
- Re: Debian Investigation Report after Server C... Scott C. Linnenbringer
- Re: Debian Investigation Report after Server Compro... Dr. MacQuigg
- Re: Debian Investigation Report after Server C... Alex Malinovich
- Re: Debian Investigation Report after Serv... Monique Y. Herman
- Re: Debian Investigation Report after ... Vineet Kumar
- Re: Debian Investigation Report af... Bijan Soleymani
- Re: Debian Investigation Report af... Carl Fink
- keys - Re: Debian Investigati... Alvin Oga
- Re: keys - Re: Debian Inv... John Hasler
- Re: Debian Investigation Repo... Paul Morgan
- Re: Debian Investigation Repo... Colin Watson
- fingerprints Re: Debian I... Alvin Oga