Opscode, the commercial side of the open source Chef configuration management tool beloved by Google, Facebook, and IBM, has warned customers that a flaw in an unnamed third-party application has left its wiki and ticketing system pwned. "The attacker gained escalated privileges and downloaded the user database for the wiki and …
'Chef configuration management tool beloved by Google'
I know, I'm being pedantic.....
Breaches/attacks like this can happen to any company. Their response time and reaction to this was exemplary. You really have to give them that.
True, but I'm also dubious on that number.
Suddenly, masses of layers evaporated.
*So* not happening!
Now, real world version:
"We noted the attack and blocked it. It ended five minutes after our efforts.
The attack could still be continuing, it could be alive and well in the city of mention in the CDC report.
Was the user database encrpted? And if not, why wasnt it?
If you note the announcement mentions that the user passwords in the database were cryptographically hashed (and via a strong hashing algorithm).
The contents of the database was the public wiki and ticket system which is already indexed by google.
Better handled than how RSA did it?
"Chef doesn't use salt" surely?
- Geek's Guide to Britain Kingston's aviation empire: From industry firsts to Airfix heroes
- Analysis Happy 2nd birthday, Windows 8 and Surface: Anatomy of a disaster
- Review Vulture trails claw across Lenovo's touchy N20p Chromebook
- Adobe spies on readers: EVERY DRM page turn leaked to base over SSL
- Analysis The future health of the internet comes down to ONE simple question…