[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: debian unofficial website hacked



On 2/8/2018 9:06 PM, Jude DaShiell wrote:
https://cdimage.debian.org/cdimage/unofficial/non-free/cd-including-firmware/buster_di_alpha2/amd64/bt-dvd/

Please try the following:

Eatch line that starts with a dollar sign ($) is a command and should be entered as written.


$ mkdir alfa2
$ cd alfa2

$ wget https://cdimage.debian.org/cdimage/unofficial/non-free/cd-including-firmware/buster_di_alpha2/amd64/bt-dvd/SHA512SUMS.sign https://cdimage.debian.org/cdimage/unofficial/non-free/cd-including-firmware/buster_di_alpha2/amd64/bt-dvd/SHA512SUMS

Output of the above command:

--...-- https://cdimage.debian.org/cdimage/unofficial/non-free/cd-including-firmware/buster_di_alpha2/amd64/bt-dvd/SHA512SUMS.sign Resolving cdimage.debian.org (cdimage.debian.org)... 194.71.11.165, 194.71.11.173, 2001:6b0:19::173, ... Connecting to cdimage.debian.org (cdimage.debian.org)|194.71.11.165|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 833
Saving to: ‘SHA512SUMS.sign’

SHA512SUMS.sign 100%[======================================================================================================>] 833 --.-KB/s in 0s

... (11.4 MB/s) - ‘SHA512SUMS.sign’ saved [833/833]

--...-- https://cdimage.debian.org/cdimage/unofficial/non-free/cd-including-firmware/buster_di_alpha2/amd64/bt-dvd/SHA512SUMS
Reusing existing connection to cdimage.debian.org:443.
HTTP request sent, awaiting response... 200 OK
Length: 172
Saving to: ‘SHA512SUMS’

SHA512SUMS 100%[======================================================================================================>] 172 --.-KB/s in 0s

... (208 MB/s) - ‘SHA512SUMS’ saved [172/172]

FINISHED --...--
Total wall clock time: 0.5s
Downloaded: 2 files, 1005 in 0s (13.6 MB/s)

$ gpg --delete-keys debian

Output of the above command:

pub 4096R/0xDA87E80D6294BE9B 2011-01-05 Debian CD signing key <debian-cd@lists.debian.org>

Delete this key from the keyring? (y/N) y

Comment: Press 'y' for eatch keys that are to be deleted.

$ gpg --recv-key 0xDA87E80D6294BE9B

Output of the above command:

gpg: requesting key 0xDA87E80D6294BE9B from hkps server hkps.pool.sks-keyservers.net gpg: key 0xDA87E80D6294BE9B: public key "Debian CD signing key <debian-cd@lists.debian.org>" imported
gpg: 2 marginal(s) needed, 2 complete(s) needed, PGP trust model
gpg: depth: 0  valid:   3  signed:   1  trust: 0-, 0q, 0n, 0m, 0f, 3u
gpg: depth: 1  valid:   1  signed:   0  trust: 1-, 0q, 0n, 0m, 0f, 0u
gpg: Total number processed: 1
gpg:               imported: 1  (RSA: 1)

$ gpg --verify SHA512SUMS.sign SHA512SUMS

Output of the above command:

gpg: Signature made Wed, Dec 06, 2017  3:02:18 AM CET
gpg:                using RSA key 0xDA87E80D6294BE9B
gpg: Good signature from "Debian CD signing key <debian-cd@lists.debian.org>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: DF9B 9C49 EAA9 2984 3258  9D76 DA87 E80D 6294 BE9B

If it does not work please post the commands used and the output of those commands.

Note that my mailer might fold this e-mail.

On Thu, 8 Feb 2018, john doe wrote:

Date: Thu, 8 Feb 2018 14:03:40
From: john doe <johndoe65534@mail.com>
To: debian-accessibility@lists.debian.org
Subject: Re: debian unofficial website hacked
Resent-Date: Thu,  8 Feb 2018 19:03:53 +0000 (UTC)
Resent-From: debian-accessibility@lists.debian.org

On 2/8/2018 7:54 PM, Jude DaShiell wrote:
 Yes, I imported the debian signing key and I have MD5SUMS and MD5SUMS.sign
 sha256SUMS SHA256SUMS.sign SHA512SUMS and SHA512SUMS.sign SHA1SUMS
 SHA1SUMS.sign.


From which URL did you get the  files?

 On Thu, 8 Feb 2018, john doe wrote:

 Date: Thu, 8 Feb 2018 07:12:27
 From: john doe <johndoe65534@mail.com>
 To: debian-accessibility@lists.debian.org
 Subject: Re: debian unofficial website hacked
 Resent-Date: Thu,? 8 Feb 2018 12:12:39 +0000 (UTC)
 Resent-From: debian-accessibility@lists.debian.org

 On 2/8/2018 12:34 PM, Jude DaShiell wrote:
 ?running gpg --verify *.sign on all sign files found where debian-buster
 is
 ?downloaded returns bad key and [unknown] on those files.? I think the
 ?website has got dirty.


 - Did you import the Debian signing key?
 - Which files did you verify (URL used, you should only use debian.org)?
 - What commands did you use and what are the output of those commands?









--
John Doe


Reply to: