Vous n'êtes pas identifié(e).
Pages : 1
Dear wiki.debian.org user,
Please be advised that we have forcibly reset your password in
response to an exploited security vulnerability in moinmoin [1,2].
Please visit the wiki and step through the password recovery steps [3]
in order to set your password to a new value.
In keeping with best practices regarding communicating password change
requests via email security, this email does not contain valid links.
Please fix xttp to http in the URLs below after pasting into your
browser's address bar.
Thanks,
Steve McIntyre for the Debian Wiki Administration Team
[1] xttp://www.debian.org/security/2012/dsa-2593
[2] xttps://lists.debian.org/debian-devel-announce/2013/01/msg00000.html
[3] xttp://wiki.debian.org/FrontPage?action=recoverpass
-- Steve McIntyre
Dernière modification par deuchdeb (04-01-2013 21:30:28)
Hors ligne
\o/ Le closedSource c'est tabou on a viendra tous à bout \o/
Hors ligne
Dear editors of the Debian wiki,
Please recall our recent email regarding the moinmoin [1] vulnerability [2] and
the penetration of Debian's wiki [3]. We have reset all password hashes and
sent individual notification to all Debian wiki account holders with
instructions on how to recover (and thereby reset) their passwords [4]. More
technical details about the attack are available [5].
We have completed our audit of the original server hosting wiki.debian.org and
have concluded that the penetration did not yield escalated privileges for the
attacker(s) beyond the 'wiki' service account.
That said, it is clear that the attacker(s) have captured the email addresses
and corresponding password hashes of all wiki editors. The attacker(s) were
particularly interested in the password hashes belonging to users of Debian,
Intel, Dell, Google, Microsoft, GNU, any .gov and any .edu.
Presumably, the intent was to generate domain / username / password tuples from
the email addresses and (eventually cracked) hashes, and to use these to attack
the home instititions of these users.
If the localpart of your email address (the portion to the left of the @) is
your username at your home institution AND if you tend to use the same password
with multiple services, then we *VERY STRONGLY* recommend changing your
password at your home institution (the portion to the right of the @).
Even if the localpart is not your username at your home institution, we
recommend updating your password as other mechanisms to map your email address
to your username may be available to the attacker(s).
If you have any questions or concerns, please contact the Debian Wiki
Administrator Team [6] and/or the Debian System Administration Team [7].
With kind regards,
Paul Wise for the Debian Wiki Administrator Team
Luca Filipozzi for the Debian System Administration Team
Le seul problème c'est que je ne comprend pas trop bien ce qu'il faut faire ou pas.
y a t-il des anglophone parmi nous?
Moi ce que j'ai compris, c'est qu'il faut changer tous les mots de passe qu'on peut avoir un peu partout sur la toile.
Hors ligne
Dernière modification par Yvance77 (07-01-2013 18:53:48)
A trop faire de l'économie un idéal, nous faisons l'économie de l'Idéal !
Hors ligne
Dernière modification par deuchdeb (07-01-2013 20:07:48)
Hors ligne
Si vous êtes fan du « Si ce n’est pas cassé, ne le corrigez pas » , vous serez un grand fan de BSD. Mais si vous êtes du genre à avoir besoin que tout soit le plus récent possible, vous feriez mieux de migrer vers Linux aussi vite que possible histoire de ne pas être à la traîne.BSD a un système de base comprenant de nombreux outils, ils sont tous développés et packagés ensemble pour être cohésif.
Hors ligne
Pages : 1