Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 2 Dec 2010 14:55:04 -0800
From:      Rob Farmer <rfarmer@predatorlabs.net>
To:        Chuck Swiger <cswiger@mac.com>
Cc:        Ivan Klymenko <fidaj@ukr.net>, freebsd-ports@freebsd.org
Subject:   Re: ftp/proftpd 1.3.3c with a version which contained a backdoor.
Message-ID:  <AANLkTikYAv%2BuSykLBawfiZYSeU=2ze=6TVUmsQvP573V@mail.gmail.com>
In-Reply-To: <17BFBD62-414E-448B-A3CE-825C9467138E@mac.com>
References:  <20101202232206.66c672a1@ukr.net> <17BFBD62-414E-448B-A3CE-825C9467138E@mac.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Dec 2, 2010 at 14:00, Chuck Swiger <cswiger@mac.com> wrote:
> Presumably/hopefully, the proftpd tarball which contained the backdoor would fail to match the distinfo for the port:
>
> SHA256 (proftpd-1.3.3c.tar.bz2) = ea7f02e21f81e6ce79ebde8bbbd334bd269a039ac9137196a35309f791b24db1
> SIZE (proftpd-1.3.3c.tar.bz2) = 4166609
>
> Checking, the tarball you now fetch is the one which matches their md5 and GnuPG signing from the link above...

For several hours on Wednesday the distinfo was updated to the
compromised version (it has been reverted), so anyone who updated this
port recently should check their system.

-- 
Rob Farmer



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?AANLkTikYAv%2BuSykLBawfiZYSeU=2ze=6TVUmsQvP573V>