I ran into an interesting problem when I downloaded the new Ubuntu Live CD for 10.04 LTS / Lucid Lynx. As soon as I booted from the Install CD, the CD proceeded to mount my hard disks and tried to establish unauthorized outbound communication with Canonical Ltd at 91.189.90.132. All of this happened automatically, without any user options or menu selections being offered to the user. I don't like that.
In a little more detail:
I have a media center PC at home that I use for watching movies, playing music, etc. Its got an old version of Ubuntu on it that's so old that I can't update the system anymore. To update the box, my only option is to install a newer operating system.
So today I downloaded the ISO image file for the Ubuntu 10.04 Desktop install CD. I burned it to a CD. Then I rebooted the computer to boot of the CD, so that I could use the "check CD for errors" menu option that's always on a linux Live CD. This time things didn't go as expected.
When the CD booted, I got a blank screen. Nothing more. After quite a long time, I got the Ubuntu splash screen. But I never got any menu options or selections that allowed me to choose what options I wanted to perform. Instead, the CD just booted to load a Gnome desktop. When the Gnome desktop loaded, all of my hard disks were already mounted. I thought that was a little odd, but not anywhere near as odd as what I noticed next:
While this boot cycle was happening, my network firewall started issuing alarms. It detected and blocked unauthorized outbound traffic originating from the PC that was running the Live CD. The firewall logs showed that the PC was attempting to make unauthorized outbound connections to Canonical Ltd at IP address 91.189.90.132.
Luckily, my LAN sits behind a very secure firewall that locks down all inbound AND OUTBOUND traffic. Unlike most simple firewalls that are designed to protect you from bad guys trying to get into your system, our firewall also protects you from authorized traffic that's trying to leave your system. If the PC is trying to make a connection that its not explicitly been allowed to perform, the firewall won't route the packets. It rejects them, issues an error, and logs the results.
Here's a snippet from my firewall logs: (my internal, non-routeable IP address has been replaced by XXX.XXX.X.X)
The IP Address of 91.189.90.132 resolves to Canonical Ltd:
Whois record for 91.189.90.132
Personally, I'm a bit concerned that any Linux distribution's live CD would mount your drives and automatically attempt to establish an outbound connection with a remote site, without even disclosing this attempted activity to you and without offering you the opportunity to either approve or disapprove of the action. I've observed this type of activity in both the Desktop and Server editions of Ubuntu Lucid Lynx / 10.04 LTS. To me, Ubuntu now represents a serious security threat.
I just thought I'd pass this information along, because most people don't have the tools to detect this kind of activity going on during the boot-up cycle. I brought up these topics at the Ubuntu forums, but my concerns were being dismissed as those of an "alarmist." Apparently, everyone at the Ubuntu forums thinks that Canonical can do no wrong.
If Microsoft were caught doing this sort of thing, people would be having a fit.
In a little more detail:
I have a media center PC at home that I use for watching movies, playing music, etc. Its got an old version of Ubuntu on it that's so old that I can't update the system anymore. To update the box, my only option is to install a newer operating system.
So today I downloaded the ISO image file for the Ubuntu 10.04 Desktop install CD. I burned it to a CD. Then I rebooted the computer to boot of the CD, so that I could use the "check CD for errors" menu option that's always on a linux Live CD. This time things didn't go as expected.
When the CD booted, I got a blank screen. Nothing more. After quite a long time, I got the Ubuntu splash screen. But I never got any menu options or selections that allowed me to choose what options I wanted to perform. Instead, the CD just booted to load a Gnome desktop. When the Gnome desktop loaded, all of my hard disks were already mounted. I thought that was a little odd, but not anywhere near as odd as what I noticed next:
While this boot cycle was happening, my network firewall started issuing alarms. It detected and blocked unauthorized outbound traffic originating from the PC that was running the Live CD. The firewall logs showed that the PC was attempting to make unauthorized outbound connections to Canonical Ltd at IP address 91.189.90.132.
Luckily, my LAN sits behind a very secure firewall that locks down all inbound AND OUTBOUND traffic. Unlike most simple firewalls that are designed to protect you from bad guys trying to get into your system, our firewall also protects you from authorized traffic that's trying to leave your system. If the PC is trying to make a connection that its not explicitly been allowed to perform, the firewall won't route the packets. It rejects them, issues an error, and logs the results.
Here's a snippet from my firewall logs: (my internal, non-routeable IP address has been replaced by XXX.XXX.X.X)
Code:
May 6 10:46:32 firewall Shorewall:loc2net:REJECT:IN=eth1 OUT=eth0 SRC=XXX.XXX.X.X DST=91.189.90.132 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=12620 DF PROTO=TCP SPT=43787 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Whois record for 91.189.90.132
Code:
IP Location: United Kingdom United Kingdom Canonical Ltd Resolve Host: rookery.canonical.com IP Address: 91.189.90.132 [Whois] [Reverse-Ip] [Ping] [DNS Lookup] [Traceroute] inetnum: 91.189.88.0 - 91.189.95.255 netname: CANONICAL-CORE descr: Canonical Ltd country: GB org: ORG-CAN1-RIPE admin-c: CAN-RIPE tech-c: CAN-RIPE status: ASSIGNED PI mnt-by: RIPE-NCC-HM-PI-MNT mnt-lower: RIPE-NCC-HM-PI-MNT mnt-by: CANONICAL-MNT mnt-routes: CANONICAL-MNT mnt-domains: CANONICAL-MNT remarks: rev-srv: ns1.canonical.com remarks: rev-srv: ns2.canonical.com remarks: rev-srv: ns3.canonical.com source: RIPE # Filtered remarks: rev-srv attribute deprecated by RIPE NCC on 02/09/2009 organisation: ORG-CAN1-RIPE org-name: Canonical Ltd org-type: OTHER address: 1 Circular Road address: Douglas address: Isle of Man address: IM1 1AF address: United Kingdom e-mail: mnt-ref: CANONICAL-MNT mnt-by: CANONICAL-MNT source: RIPE # Filtered role: Canonical Ltd Admin address: 1 Circular Road address: Douglas address: Isle of Man address: IM1 1AF e-mail: admin-c: LJ974-RIPE admin-c: JT2256-RIPE admin-c: NM1806-RIPE admin-c: CJ1182-RIPE admin-c: SS8542-RIPE tech-c: LJ974-RIPE tech-c: JT2256-RIPE tech-c: NM1806-RIPE tech-c: CJ1182-RIPE tech-c: SS8542-RIPE nic-hdl: CAN-RIPE mnt-by: CANONICAL-MNT source: RIPE # Filtered route: 91.189.88.0/21 descr: Canonical Route Object origin: AS41231 mnt-by: CANONICAL-MNT source: RIPE # Filtered
Personally, I'm a bit concerned that any Linux distribution's live CD would mount your drives and automatically attempt to establish an outbound connection with a remote site, without even disclosing this attempted activity to you and without offering you the opportunity to either approve or disapprove of the action. I've observed this type of activity in both the Desktop and Server editions of Ubuntu Lucid Lynx / 10.04 LTS. To me, Ubuntu now represents a serious security threat.
I just thought I'd pass this information along, because most people don't have the tools to detect this kind of activity going on during the boot-up cycle. I brought up these topics at the Ubuntu forums, but my concerns were being dismissed as those of an "alarmist." Apparently, everyone at the Ubuntu forums thinks that Canonical can do no wrong.
If Microsoft were caught doing this sort of thing, people would be having a fit.
Comment