LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-02-2010, 11:25 PM   #1
zolax
LQ Newbie
 
Registered: Apr 2004
Posts: 20

Rep: Reputation: 0
deleted file stripes


I work for a seismic company that has recently experienced a security issue. Because we have an isolated network that is used for HPC work we have a very open security structue ie password less accounts rsh rlogin etc. We had, seemingly,a user that has maliciously deleted another user's files but I still haven't figured out how. So far I have been able to prove that this user has remotely logged into another host under that user's account... or at least that their workstation did. The /var/log/message file shows logins from their workstation as that user multiple times durring the times that these files were being deleted. There are wildcard searches for these files in the history in this host. There is a vi session initiated on this host for a file called delme (delete me) and then a chmod +x for this file. and then a deletion of this file (rm delme). Funny things: this user has no business in this acct. this user was bounced off the other host (permission denied) when trying to log into the other host and then as root logged into the other host as the other acct. repeatedly... ie. rsh -l xxx (permis den) then as root rsh -l xxx (logged in) why not su xxx and then rsh? password less acct?! why use root privs (which they sholuld not have) to log into a passwd less acct? Can't see any remote logins to their workstation from elsewhere. can't find smoking gun. no execution of delme script or any other rm /*/xxx/* sort of command that proves when file deletion of striped files happened?!

changing root passwd soon
need proof that no remote logins to a CentOS 5.3 workstation could be responsible.
Could mean someone gets fired.
how can I be sure that no other users logged into this machine and then into another machine for sure?
Our normal sysadmin is out on vacation for 2 weeks.
HELP!
 
Old 07-03-2010, 05:45 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Facts:
Quote:
Originally Posted by zolax View Post
- company (..) recently experienced a security issue.
- we have an isolated network
- very open security structure i.e. password-less accounts rsh rlogin etc.
- a user (..) has (..) deleted another user's files

- /var/log/message file shows logins from their workstation as that user multiple times during the times that these files were being deleted.
- There are wild card searches for these files in the history in this host.
- There is a vi session initiated on this host for a file called delme (delete me) and then a chmod +x for this file and then a deletion of this file (rm delme).

- user was bounced off the other host (permission denied) when trying to log into the other host and then
- as root logged into the other host as the other acct. repeatedly... (..)
- changing root password soon

Questions:
Quote:
Originally Posted by zolax View Post
0. no execution of delme script or any other rm /*/xxx/* sort of command (..)
"No execution" as in ~/.bash_history?
- How did you ensure all ~/.bash_history files are complete and present history correctly?
- How about global or user initiated cron or at jobs?
- If 'acct' runs did you check all users execution accounting details?


Quote:
Originally Posted by zolax View Post
1. need proof that no remote logins to a CentOS 5.3 workstation could be responsible. / how can I be sure that no other users logged into this machine and then into another machine for sure?
- You say "we have an isolated network". So does this mean it is NOT isolated? Remote logins ARE possible?
- Did you correlate ALL router logs and ALL system and daemon logs, and all history files and all user accounting files (lastlog, wtmp, utmp, btmp) on ALL hosts?


Quote:
Originally Posted by zolax View Post
2. why use root privs (..) to log into a password-less account?
As you said "rsh -l user" failed and "rsh -l user" succeeded when executed as root account user. It succeeded. Hence security breached. So I think, in terms of priorities, that this is not the most important question right now. Fact is fact, save speculation for later.


What I suggest you do is:
- Inform network personnel (unless you are the only one: then inform responsible management),
- Familiarize yourself with generic tasks to perform from the Intruder Detection Checklist (CERT): http://web.archive.org/web/200801092...checklist.html before doing anything else,
- Decide on truly sealing off the "isolated" network from any public network access at the router,
- Image hosts for further investigation if necessary,
- Secure all logs everywhere and process them on a secured, detached, workstation only you and management have access to.

* Please, please do not use terms like "remote login", "this host", "that host", "acct xxx" or "user". Instead describe factually like "remote login to server X from same subnet workstation Z", "this host X", "that host Y", "acct user1", "remote user2".
 
Old 07-03-2010, 12:25 PM   #3
zolax
LQ Newbie
 
Registered: Apr 2004
Posts: 20

Original Poster
Rep: Reputation: 0
we are not connected to the internet. By remote login I mean from workstation to server or workstation to workstation.

thanks for the info and the link. I'll do some research this weekend and then see what I can find on Tuesday.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Deleted log file - how to get back via file descriptor and keep alive? prollocks Linux - General 1 05-29-2009 09:08 AM
Need help to recover Deleted file - (file was saved in doc) Pravab Ubuntu 2 08-17-2008 10:57 AM
LXer: They Will Be Known By Their Stripes LXer Syndicated Linux News 0 06-05-2007 07:02 PM
Stripes on screen drexler Linux - Hardware 2 01-02-2006 06:14 AM
Strange stripes with MACH64 -=bcc=-E-nigma Linux - Hardware 2 04-30-2003 11:48 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:52 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration