{"id":890,"date":"2007-10-31T23:30:46","date_gmt":"2007-11-01T07:30:46","guid":{"rendered":"\/?p=890"},"modified":"2007-11-06T11:52:10","modified_gmt":"2007-11-06T19:52:10","slug":"breached","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=890","title":{"rendered":"Breached"},"content":{"rendered":"<p>My blog was hacked over the weekend.&nbsp;&nbsp;It was apparently&nbsp;a cross-site scripting attack&nbsp;carried out&nbsp;through a <a href=\"http:\/\/wordpress.org\/development\/2007\/10\/wordpress-231\/\">vulnerability in WordPress<\/a>.&nbsp; WordPress has&nbsp;released a fix (Version 2.3.1) and I&#39;ve now installed it.<\/p>\n<p><a href=\"http:\/\/blogs.zdnet.com\/security\/?p=617\" class=\"broken_link\">ZDNet broke the news<\/a> on Monday &#8211; I was awakened by PR people.&nbsp;&nbsp;The headline read, &#8220;Microsoft privacy guru&#39;s site hacked&#8221;.&nbsp; Fifteen minutes of fame:<\/p>\n<blockquote><p>IdentityBlog.com, a Web site run by Microsoft\u00e2\u20ac\u2122s chief architect of identity and access, has been hacked and defaced.<\/p>\n<p>The site, which is used by Microsoft\u00e2\u20ac\u2122s <a href=\"http:\/\/www.microsoft.com\/presspass\/features\/2005\/may05\/05-12DigitalID.mspx\" class=\"broken_link\"><font color=\"#666666\">Kim Cameron<\/font><\/a> to promote discussion around privacy, access and security issues, now contains an \u00e2\u20ac\u0153owned by me\u00e2\u20ac\u009d message and a link to a third-party site (see screenshot).<\/p>\n<p><img border=\"0\" src=\"\/wp-content\/images\/2007\/10\/hack.png\" \/><\/p><\/blockquote>\n<p>Naturally there were more than a few&nbsp;congratulatory messages&nbsp;like this one from &#8220;<a href=\"http:\/\/alkinnunen.typepad.com\/livingintension\/2007\/10\/i-just-cant-hel.html?cid=88331890#comment-88331890\" class=\"broken_link\">Living in Tension<\/a>&#8221; (whose tagline&nbsp;says he has &#8220;Christ in one hand, and the world in the other):<\/p>\n<blockquote><p>Several years of working in the Information Technology world have unintentionally transformed me into a <em>OSS , Linux, security zealot&#8230;<\/em><\/p>\n<p>&#8230; Tasty little tidbits like this are just too good to be true<\/p><\/blockquote>\n<p>I wonder if&nbsp;he would have put it this way had he&nbsp;known&nbsp;my blog is run by <a href=\"http:\/\/textdrive.com\/\">commercial hosters (TextDrive) <\/a>using Unix BSD, MySQL, PHP and WordPress &#8211; all&nbsp;OSS products.&nbsp; There is no Microsoft software involved at the server end &#8211; just open source.&nbsp;&nbsp;<\/p>\n<p>The <a href=\"http:\/\/blogs.zdnet.com\/security\/?p=617\" class=\"broken_link\">discussion list at ZDNet <\/a>is amusing and sobering at the same time.&nbsp; Of course it starts with a nice &#8220;ROTFLMAO&#8221; from someone called &#8220;Beyond the vista, a Leopard is stalking&#8221;:&nbsp;<\/p>\n<blockquote><p>This one was priceless . How can Microsoft&#39;s Security Guru site get hacked ? Oh my all the MS fanboys claim that Microsoft products are so secure .<\/p>\n<p>&lt;NOT!&gt;<\/p><\/blockquote>\n<p>But then &#8220;ye&#8221;, who&nbsp;checks his facts before opening his mouth,&nbsp;has a big &#8216;aha&#8217;:<\/p>\n<blockquote><p>How can this be? It <a href=\"http:\/\/toolbar.netcraft.com\/site_report?url=https:\/\/www.identityblog.com\">runs on UNIX<\/a>!<\/p>\n<p><img border=\"0\" src=\"\/wp-content\/images\/2007\/10\/iblog_os.jpg\" \/><\/p>\n<p>FreeBSD Apache 29-Jun-2007<\/p>\n<p>Why it&#39;s the very same BSD UNIX upon which OS X is based. The very one we&#39;ve heard makes OS X so ultra secure and hack proof.<\/p><\/blockquote>\n<p>This is too much for poor &#8220;Stalking Leopard&#8221; to bear:<\/p>\n<blockquote><p>How about explaining as to what a Microsoft employee would be doing using a UNIX server ? I don&#39;t think microsoft would be too happy hearing about their employee using&#8230; more than their inherently safe IIS server.<\/p><\/blockquote>\n<p>Gosh, is the &#8220;Stalking Leopard&#8221;&nbsp; caught in a reverse-borg timewarp?<\/p>\n<p>By this point &#8220;fredfarkwater&#8221; seems to have had enough:<\/p>\n<blockquote><p>What kind of F-in idiots write in this blog? Apple this or MS that or Linux there&#8230;.. What difference doesn&#39;t it make what OS\/platform you choose if it does the job you want it to? A computer is just a computer, a tool, you idiot brainless toads! A system is only as secure as you make it as stated here. You *ucking moron&#39;s need a life and to grow up and use these blogs for positive purposes rather than your childish jibbish!<\/p><\/blockquote>\n<p>But as passionate as Fred&#39;s advice might be, it doesn&#39;t seem to be able to save &#8220;Linux Geek&#8221;, who at this point proclaims:<\/p>\n<blockquote><p><em>This is a shining example why you should host on Linux + Apache .<\/em><\/p>\n<p>For those who still don&#39;t get it, this shows the superiority of Linux and OSS against M$ products.<\/p><\/blockquote>\n<p>Back comes a salvo of &#8220;It&#39;s on Unix&#8221;, by mharr; &#8220;lol&#8221; by toadlife; and &#8220;Shut up Fool!&#8221; by John E. Wahd.<\/p>\n<p>&#8220;Ye&#8221; and marksashton are similarly incredulous:<\/p>\n<blockquote><p>You do realize that you just made an idiot of yourself, right?<\/p>\n<p>Man you are just too much. I&#39;m sure all of the people who use Linux are embarassed by you and people like you who spew such nonsense.<\/p><\/blockquote>\n<p>Insults fly fast and furious until &#8220;Linux User&#8221; tells &#8220;Linux Geek&#8221;:<\/p>\n<blockquote><p>I really hope you know&nbsp; just how idiotic you look with this post! What an ID10T.<\/p><\/blockquote>\n<p>It seems&nbsp;the last death rattle of the performance has sounded, but then there&#39;s a short &#8220;second breath&#8221; when &#8220;myOSX&#8221; has a brainwave:<\/p>\n<blockquote><p>Maybe he moved the site after it got hacked ???<\/p><\/blockquote>\n<p>After that&#39;s nixed by &#8220;ye&#8221;, &#8220;Scrat&#8221; concludes:<\/p>\n<blockquote><p>So it appears that dentityblog.com was being hosted by <a target=\"_blank\" href=\"http:\/\/textdrive.com\/\"><font color=\"#003399\">TextDrive, Inc<\/font><\/a> using Apache on FreeBSD.<\/p>\n<p>Bad Microsoft!<\/p><\/blockquote>\n<p>The truth of the matter is very simple.&nbsp; I like WordPress, even if it&nbsp;has had some&nbsp;security problems, and I don&#39;t want to give it up.<\/p>\n<p>My site practices Data Rejection, so there is no &#8220;honeypot&#8221; to protect.&nbsp; My main interest is in having an application I like to use and being part of the blogosphere conversation.&nbsp; If I&#39;m breached from time to time, it will raise a few eyebrows, as it has done this week, but hopefully even that can help propagate my main message:&nbsp; always design systems on the basis they will be breached &#8211; and still be safe.<\/p>\n<p>Although in the past I have often&nbsp;hosted&nbsp;operational systems&nbsp;myself, in this project I have wanted to understand all the ins and outs and constraints of using a hosted service.&nbsp; I&#39;m pretty happy with TextDrive and think they&#39;re very professional.<\/p>\n<p><img border=\"0\" vspace=\"5\" src=\"\/wp-content\/images\/2007\/11\/st_francis_breached.jpg\" hspace=\"10\" alt=\"After the breach at St. Francis dam\" \/><br \/>\nI accept that I&#39;m a&nbsp;target.&nbsp;&nbsp;Given the current state of blogging software&nbsp;I expect I&#39;ll be breached again (this is the second time my site has been hacked through a WordPress vulnerability).&nbsp;<\/p>\n<p>But,&nbsp; I&#39;m&nbsp;happy to work with&nbsp;WordPress and others&nbsp;to solve the problems, because there are no silver bullets&nbsp;when it comes to&nbsp;security, as I hope Linux Geek learns, especially&nbsp;in environments&nbsp;where there is a lot of innovation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#39;s a lot of ideology to get past in teaching people about security <\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[12,13,40,42,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/890"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=890"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/890\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}