TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Apple Developer Website Update

282 点作者 danielsiders将近 12 年前
Email from Apple<p>Apple Developer Website Update<p>Last Thursday, an intruder attempted to secure personal information of our registered developers from our developer website. Sensitive personal information was encrypted and cannot be accessed, however, we have not been able to rule out the possibility that some developers’ names, mailing addresses, and&#x2F;or email addresses may have been accessed. In the spirit of transparency, we want to inform you of the issue. We took the site down immediately on Thursday and have been working around the clock since then.<p>In order to prevent a security threat like this from happening again, we’re completely overhauling our developer systems, updating our server software, and rebuilding our entire database. We apologize for the significant inconvenience that our downtime has caused you and we expect to have the developer website up again soon.

51 条评论

Lightbody将近 12 年前
Here&#x27;s my semi-educated guess for how the attack started: from casual observation (view source, URLs ending with .action, etc) a good chunk of the ADC is written in Java and uses WebWork&#x2F;Struts2, a framework I helped create years ago.<p>Late last week a security advisory came out that allows for executing malicious code[1]. Atlassian, which uses similar technology, also issued announcements around the same time[2]. My wild speculation is this was the attack vector.<p>Sadly, I feel some responsibility for this pretty major security hole. There have been a few like this and they are all rooted in the fact that almost 9 years ago I made the (bad) decision to use OGNL as WebWork&#x27;s expression language. I did so because it was &quot;powerful&quot; but it opened up all sorts of extra binding trickery I never intended. I haven&#x27;t been contributing to the project in 5+ years, but this is a good reminder how technology choices tend to stick around a lot longer than you ever imagine :)<p>[1] <a href="http://struts.apache.org/release/2.3.x/docs/s2-016.html" rel="nofollow">http:&#x2F;&#x2F;struts.apache.org&#x2F;release&#x2F;2.3.x&#x2F;docs&#x2F;s2-016.html</a> [2] <a href="https://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2013-07-16" rel="nofollow">https:&#x2F;&#x2F;confluence.atlassian.com&#x2F;display&#x2F;BAMBOO&#x2F;Bamboo+Secur...</a>
评论 #6081783 未加载
评论 #6081589 未加载
评论 #6081790 未加载
jpdoctor将近 12 年前
&gt; <i>Sensitive personal information was encrypted and cannot be accessed, however, we have not been able to rule out the possibility that some developers’ names, mailing addresses, and&#x2F;or email addresses may have been accessed.</i><p>So they can&#x27;t rule out the possibility that sensitive personal information, which cannot be accessed, has been accessed. Got it.<p>Apparently our intelligence, which cannot be insulted, has been insulted.
评论 #6080747 未加载
评论 #6081313 未加载
评论 #6080742 未加载
评论 #6080925 未加载
评论 #6082038 未加载
评论 #6080768 未加载
评论 #6080946 未加载
评论 #6080787 未加载
tcas将近 12 年前
I downloaded the CRL for developer certificates [1] and quickly looked at it using grep:<p><pre><code> grep -E &quot;Revocation Date: Jul 17 .{8} 2013&quot; wwdrccrl.txt | wc -l 3065 grep -E &quot;Revocation Date: Jul 18 .{8} 2013&quot; wwdrccrl.txt | wc -l 2289 grep -E &quot;Revocation Date: Jul 19 .{8} 2013&quot; wwdrccrl.txt | wc -l 2 grep -E &quot;Revocation Date: Jul 20 .{8} 2013&quot; wwdrccrl.txt | wc -l 0 grep -E &quot;Revocation Date: Jul 21 .{8} 2013&quot; wwdrccrl.txt | wc -l 0 </code></pre> These are the two certificates that were revoked on the 19th<p><pre><code> grep -A 3 -B 1 -E &quot;Revocation Date: Jul 19 .{8} 2013&quot; wwdrccrl.txt Serial Number: 2628C7F90970D227 Revocation Date: Jul 19 03:14:04 2013 GMT CRL entry extensions: X509v3 CRL Reason Code: Key Compromise -- Serial Number: 1A51ABFA4844BD45 Revocation Date: Jul 19 03:24:03 2013 GMT CRL entry extensions: X509v3 CRL Reason Code: Key Compromise </code></pre> To generate the wwdrccrl.txt file I used:<p><pre><code> openssl crl -inform DER -text -noout -in wwdrca.crl &gt; wwdrccrl.txt </code></pre> Just to be clear -- every entry there I see lists the reason as Key Compromise, just interesting that they usually seem to revoke at least 2000 certificates a day but suddenly stopped on the 19th with just revoking 2.<p>[1]<a href="http://www.apple.com/certificateauthority/" rel="nofollow">http:&#x2F;&#x2F;www.apple.com&#x2F;certificateauthority&#x2F;</a>
评论 #6081272 未加载
dakrisht将近 12 年前
&quot;Completely overhauling our developer systems, updating our server software, and rebuilding our <i>entire</i> database.&quot;<p>That does not sound like an intruder &quot;attempt&quot; by any means.<p>They got hacked, and they got hacked bad if they&#x27;re rebuilding databases and overhauling entire enterprise-class systems over there.<p>Transparent my ass. They&#x27;re deep in the gutter, 3-days and counting no fix, engineers are probably working 24 hours a day and the entire site is still down. This isn&#x27;t a small time breach folks. They had to go public considering it will probably be down for a few more days...
sarreph将近 12 年前
A little more info from TC: <a href="http://techcrunch.com/2013/07/21/apple-confirms-that-the-dev-center-has-potentially-been-breached-by-hackers/" rel="nofollow">http:&#x2F;&#x2F;techcrunch.com&#x2F;2013&#x2F;07&#x2F;21&#x2F;apple-confirms-that-the-dev...</a><p>Update — Just got off the phone with an Apple rep, who confirmed a bit more:<p>- The hack only affected developer accounts; standard iTunes accounts were not compromised<p>- Credit card data was not compromised<p>- They waited three days to alert developers because they were trying to figure out exactly what data was exposed<p>- There is no time table yet for when the Dev Center will return
johansch将近 12 年前
There is an interesting comment at techcrunch:<p><a href="http://fyre.it/tjlVmC.4" rel="nofollow">http:&#x2F;&#x2F;fyre.it&#x2F;tjlVmC.4</a><p>&quot;[...] One of those bugs have provided me access to users details etc. I immediately reported this to Apple. I have taken 73 users details (all apple inc workers only) and prove them as an example.<p>4 hours later from my final report Apple developer portal gas closed down and you know it still is. I have emailed and asked if I am putting them in any difficulty so that I can give a break to my research. I have not gotten any respond to this.. [...] &quot;
评论 #6081462 未加载
jchimney将近 12 年前
I read the comments dismissing apples handling of this. What would you have expected them to do? There is a LOT of forensics going on probably even now trying to get a handle on this. A massive corp isn&#x27;t going to make an announcement until they have some idea what they&#x27;re talking about. In my books 4 days is a very quick first announcement from a company of this size.
tsm将近 12 年前
These details are befuddling. &quot;Personal information was encrypted and cannot be accessed&quot;. It can&#x27;t be accessed because it&#x27;s somehow stored elsewhere, or it can&#x27;t be accessed <i>because</i> of the encryption? That is, does the intruder currently own my encrypted data?<p>I&#x27;m also disappointed that it took them 72 hours to tell us <i>anything,</i> and that the update doesn&#x27;t even have a timeline for when the site may be back. &quot;Soon&quot; is meaningless.
评论 #6080978 未加载
评论 #6080697 未加载
评论 #6080671 未加载
yapcguy将近 12 年前
&gt; &quot;In the spirit of transparency, we want to inform you of the issue.&quot;<p>Ha, what a joke, I can&#x27;t help laughing at that.<p>With so many third-party Apple developers drinking the kool-aid, and dreaming of becoming rich, I&#x27;m not surprised Apple treat them like fools.<p>Just yesterday on Twitter, some developers were speculating that the site was taken down to be updated with new SDKs for exciting new features and product lines.
评论 #6080982 未加载
pdknsk将近 12 年前
Hmm so it only takes a few days to &quot;completely overhaul&quot; their developer systems? Not sure I believe this is what they&#x27;re actually doing. And why haven&#x27;t they updated their server software before? I know mistakes can never be completely avoided, but this seems slightly amateurish for a company with so much cash.
评论 #6080780 未加载
评论 #6080808 未加载
评论 #6080732 未加载
peterkelly将近 12 年前
I understand everyone&#x27;s frustrations with this, and the fact that Apple haven&#x27;t been immediately clear on exactly what happened. As a developer, I too am alarmed by what has happened.<p>But these things are complex, and it takes time (i.e. a few days) to fully and properly evaluate what has happened and what information leaks&#x2F;security breaches have occurred.<p>Let&#x27;s give this a reasonable amount of time, and only then pass judgement on their handling of the case.<p>I don&#x27;t want to appear like an Apple apologist - and maybe it is a serious fault on their side. But in fairness I do think it&#x27;s reasonable we give them time to evaluate &amp; respond appropriately.
kyro将近 12 年前
No reason to be up in arms, folks. They&#x27;ve got the marketing team working on this too.
评论 #6080709 未加载
评论 #6080691 未加载
nwh将近 12 年前
Uh, how does this &quot;encryption&quot; work?<p>For the website to show these details (and it does, in part, use these details in the interface) it must be able to decrypt these on the web applications side. Ergo the keys for decryption must also be on the server or derived from the users passwords, both of which make the use of encryption a fairly worthless venture.<p>ED: As another commenter mentioned in an earlier thread, lots of other AppleID facing applications are gone as well ( <a href="https://ecommerce.apple.com/" rel="nofollow">https:&#x2F;&#x2F;ecommerce.apple.com&#x2F;</a> ), so it would be interesting to find out how far this all goes. The websites don&#x27;t seem that far disconnected from the information in iCloud.
评论 #6080677 未加载
评论 #6080893 未加载
ChuckMcM将近 12 年前
I got this email about an hour ago. I feel sorry for the folks who are &quot;updating our server software, and rebuilding our entire database&quot;. Songs will be sung in the opsen bars about about this battle.<p>From the sound of the email it suggests they have records of some data (perhaps not sensitive data :-) being compromised but no root cause on how it was compromised, so they are re-building systems from the ground up validating, configuring, and then moving to the next step.There are times where this is faster than spending time trying to root cause the exploit.<p>That said, this is where privacy and security collide. Since logs going back months of what everyone has done on every system really helps reconstruct things, but of course if you have those logs it means that someone else can abuse them.
peterkelly将近 12 年前
Good to see some transparency on Apple&#x27;s part here.<p>I understand this must be a very challenging situation for them to deal with, and I appreciate the notification. As I&#x27;m sure many developers feel, I&#x27;d like to know more details, but I&#x27;m sure these will come in due course.
评论 #6080846 未加载
评论 #6080900 未加载
评论 #6080726 未加载
kalleboo将近 12 年前
Any idea what &quot;rebuilding our database&quot; means? Reticulating the splines? I hear those go out of alignment sometimes.
评论 #6081105 未加载
tlongren将近 12 年前
&quot;In the spirit of transparency&quot;. Right, Apple.
评论 #6080670 未加载
tater将近 12 年前
Theres a security researcher commenting on techcrunch claiming he&#x27;s responsible for the breach here <a href="http://fyre.it/tjlVmC.4" rel="nofollow">http:&#x2F;&#x2F;fyre.it&#x2F;tjlVmC.4</a><p>His proof uploaded to youtube: <a href="http://www.youtube.com/watch?v=q000_EOWy80" rel="nofollow">http:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=q000_EOWy80</a>
评论 #6081737 未加载
jhspaybar将近 12 年前
For what it&#x27;s worth, Wednesday morning at 4am I had an email account associated with my developer account compromised(they both stupidly used the same password). This account was used for almost nothing but accessing my developer accounts at Apple. At the time, I thought my Apple accounts might be in trouble and I immediately changed all my Apple related passwords as well as regained control of my email account. I&#x27;m now wondering if the breach might have gone the other direction...
评论 #6081607 未加载
blinkingled将近 12 年前
&gt; In order to prevent a security threat like this from happening again, we’re completely overhauling our developer systems, updating our server software, and rebuilding our entire database.<p>I am wondering what was the thought process behind this gem. I think this looks like a knee jerk reaction and it&#x27;s particularly lacking polish coming from Apple. I mean clearly Apple knows that &quot;overhauling&quot; systems and updating software is no guarantee for future security. It&#x27;s not a one time fix - it&#x27;s an ongoing process. And rebuilding entire database - that&#x27;s just crazy talk! This is especially inexcusable because the target of this update are developers!<p>Security is hard - you&#x27;ve got legacy crap, 3rd party&#x2F;unsupported code, you&#x27;ve got open source code and then you have your own code that has evolved to be a Frankenstein. I don&#x27;t have a problem with Apple getting it wrong once - but the statement does nothing to make developers confident that Apple will finally get web services right.
thepumpkin1979将近 12 年前
`rebuilding our entire database`. So the database was... destroyed...?
评论 #6081763 未加载
sampk将近 12 年前
&gt; <i>intruder attempted to secure personal information</i><p>haha &quot;secure&quot;. Am so using that word next time my site gets hacked.
评论 #6082371 未加载
djvu9将近 12 年前
Could it be related to CVE-2013-2251 which was released on 07&#x2F;20? The URL developer.apple.com&#x2F;devcenter&#x2F;ios&#x2F;index.action seems struts alike..
coldcode将近 12 年前
Jeez people, a company identifies a hack attempt, stops it, and makes sure it never happens again. How often do you hear that one? Most companies don&#x27;t even tell you anything happened and if they are forced to, they don&#x27;t even admit anything bad happened (we only exposed 80,000,000 credit cards, no biggie).<p>If my employer suffered this I doubt they&#x27;d even tell the employees.<p>What do all of us do when we find a security issue?
评论 #6081191 未加载
michaelxia将近 12 年前
Thanks Apple! This email was super helpful, now I know exactly whats going on.
评论 #6080854 未加载
dphase将近 12 年前
This may explain some strange occurrences I had yesterday.<p>Starting at 7am, I received an Apple ID password reset request every 4 hours and 19 minutes, ending last night at midnight.<p>This Apple ID is also the login for my personal developer account (several years old). My developers IDs used for work never received a password reset request.
评论 #6081044 未加载
GR8K将近 12 年前
It&#x27;s also posted here: <a href="http://devimages.apple.com/maintenance/" rel="nofollow">http:&#x2F;&#x2F;devimages.apple.com&#x2F;maintenance&#x2F;</a><p>screenshot: <a href="http://i.imgur.com/9BicjeE.jpg" rel="nofollow">http:&#x2F;&#x2F;i.imgur.com&#x2F;9BicjeE.jpg</a>
0x0将近 12 年前
I wonder if the hackers managed to get code signing keys out? Ultimate jailbreak?
评论 #6080775 未加载
zztop将近 12 年前
I can&#x27;t feel too bad for Apple. They use WW&#x2F;Struts but when was the last time they contributed to the project? They never have. Open source volunteers do their best but unless big corporations want to spend their own money, and do their own security assessments, and contribute back anything they find, what do you expect? It&#x27;s great when you get things for free, but when you&#x27;re sitting on billions, send some back to the community you&#x27;re using code from.
yulaow将近 12 年前
Can it be related to the similar attack on the ubuntu forum? Maybe it was a single group of hackers targeting the servers in which they know a lot of developers have an account
plasma将近 12 年前
Is the encryption not good enough (and I mean in general when sites get bcrypt&#x27;d passwords stolen, etc) when owners are worried the encrypted data is in the hands of intruders?<p>As a developer I&#x27;d still be concerned if I lost such data when encrypted - so I understand - but what measures can be put in place so that as a developer&#x2F;site owner you&#x27;re without uncertainty that the encrypted data will never be encrypted by the attacker (eg, would take trillions of years).
general_failure将近 12 年前
If anyone thinks this is the complete truth, well be prepared to be fooled many times more. I mean the thing is down for 3 days now. This must be a huge breach.
评论 #6080936 未加载
tater将近 12 年前
I bet Forstall did it.
jamesjyu将近 12 年前
Yep, I can confirm I just got this as well.
评论 #6080643 未加载
0x0将近 12 年前
Imagine what you could do here: - break into facebook or twitter or any other high profile dev account - reissue new code signing keys - crack the latest public app and patch in a backdoor - code sign with new keys and submit as an app update
评论 #6080953 未加载
0x0将近 12 年前
Well at least it was &quot;only&quot; the dev center, and not iCloud and iMessage!
评论 #6080745 未加载
stephen_gareth将近 12 年前
I&#x27;m more interested in the identity of the intruder for some reason. Who&#x2F;what are they? Presumably there are easier targets to steal credit card numbers from, for example.
tszming将近 12 年前
&gt;&gt; and rebuilding our entire database.<p>maybe someone dropped or polluted the database after hacking it, so they need to rebuild the entire database from other sources?
GR8K将近 12 年前
Manage your Apple ID&#x2F;password&#x2F;security questions here: <a href="https://appleid.apple.com" rel="nofollow">https:&#x2F;&#x2F;appleid.apple.com</a>
评论 #6080973 未加载
foobarme将近 12 年前
Apple jargon for &quot;oh <i></i><i></i>&quot;
vmarsy将近 12 年前
If the intruder is a patent troll-er, getting developers’ names and mailing addresses can be pretty harmful.
评论 #6081031 未加载
评论 #6080740 未加载
jamin将近 12 年前
Thanks Apple. Now what really happened?
diminoten将近 12 年前
Is there any other source that this actually happened besides from a guy posting some text on HN?
评论 #6080899 未加载
评论 #6080889 未加载
评论 #6080784 未加载
评论 #6080849 未加载
soheil将近 12 年前
wow if they&#x27;re &quot;overhauling&quot; everything that means Apple knows that hackers got some or all developers&#x27; info so it&#x27;s not just that they can&#x27;t &quot;rule it out&quot; they just don&#x27;t want to publicly announce it.
rimantas将近 12 年前
I got a feeling that the most outraged never used Apple developer portal in their life.
jlebrech将近 12 年前
glad that i use a password manager and disable no-paste from firebug in order to login.
noja将近 12 年前
&gt; Sensitive personal information was encrypted<p><i>sigh</i> Tell us exactly what was and what wasn&#x27;t encrypted.
rogerchucker将近 12 年前
How is a developer&#x27;s mailing address not a sensitive information for that developer? How does a tech company get away making a blanket assumption like that?
rogerchucker将近 12 年前
Is there a database of intrusion attempts (and successful ones too) made at tech companies?
smallsharptools将近 12 年前
Until I see an email from Apple myself I will not see this info as credible.
评论 #6080785 未加载
评论 #6080868 未加载
评论 #6080774 未加载
评论 #6080757 未加载
评论 #6080766 未加载
dano414将近 12 年前
I got kicked out of an Apple store. I questioned a Managers managatorial expertise. I took his angry picture at the door(Eric in Corte Madera). I am tempted to post it on youtube, but feel punishment enough is working there? Oh yea, the reason he was furious at me, is because I didn&#x27;t like the way he was treating my salesman. I&#x27;ve never understood people who let a title go to their head? Off topic, just venting.