LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-10-2009, 04:05 PM   #16
neilcpp
Member
 
Registered: Jul 2003
Location: England
Distribution: Debian Jessie, FreeBSD 10.1 anything *nix to get my fix
Posts: 329

Original Poster
Rep: Reputation: Disabled

i could not sleep so i had to just wipe my computers and reinstall the operating sytems (i know i should have saved the logs first but i could not wait) + i at least changed my password for the router. If anyone feels like trying to guess it with a password craker - good luck to them.

Thanks everyone for your help.

i will have to build my systems up again to be bullet proof. I was not aware of the importance of this issue. My isp never stressed it at all - and no one told me - so i guess i take a George W Bush approach to this issue:
"You fool me once, shame on you, You fool me twice, shame on me".
 
Old 02-10-2009, 04:07 PM   #17
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by neilcpp View Post
i could not sleep so i had to just wipe my computers and reinstall the operating sytems (i know i should have saved the logs first but i could not wait) + i at least changed my password for the router. If anyone feels like trying to guess it with a password craker - good luck to them.
Well, you still haven't confirmed to us that the web interface on the router is indeed accessible from the outside. If it's not, then an attacker would need to exploit one of your internal machines before being able to try and crack your router's password.

Last edited by win32sux; 02-10-2009 at 04:59 PM.
 
Old 02-10-2009, 10:56 PM   #18
neilcpp
Member
 
Registered: Jul 2003
Location: England
Distribution: Debian Jessie, FreeBSD 10.1 anything *nix to get my fix
Posts: 329

Original Poster
Rep: Reputation: Disabled
it was accessable from a outside portscan - ports 23 telnet and port 80. i disabled remote login and set the router firewall to disallow all connection from outside. i set Very very difficult 'passwords' for telnet + web logon - if someone got that far.
 
Old 02-10-2009, 10:59 PM   #19
neilcpp
Member
 
Registered: Jul 2003
Location: England
Distribution: Debian Jessie, FreeBSD 10.1 anything *nix to get my fix
Posts: 329

Original Poster
Rep: Reputation: Disabled
my whole account has been compromised for several months. i never noticed someones (lame) attempt to route my traffic to some ip until yesterday though..this was a bigger issue than having no firewall if you ask me - and its not even made public by anyone so people can avoid this problem.
 
Old 02-11-2009, 05:59 AM   #20
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Are you really sure it allowed connections from the outside to the admin interface though? The default setting is to disable remote administration. Did you check the settings page to confirm that? If it is allowing remote administration, you should disable it.

I think you're quite possibly overreacting due to not completely understanding how to interpret the information you have.
 
Old 02-11-2009, 08:27 AM   #21
Matir
LQ Guru
 
Registered: Nov 2004
Location: San Jose, CA
Distribution: Debian, Arch
Posts: 8,507

Rep: Reputation: 128Reputation: 128
What method were they using to redirect your traffic to an outside IP? If your router was compromised, did you reset the firmware to ensure no back doors were left in it? Did you find logs substantiating that it had been compromised for "several months"?
 
Old 02-11-2009, 06:29 PM   #22
neilcpp
Member
 
Registered: Jul 2003
Location: England
Distribution: Debian Jessie, FreeBSD 10.1 anything *nix to get my fix
Posts: 329

Original Poster
Rep: Reputation: Disabled
The logs on the router was clear. The sonofabitch that hacked me probably cleared the logs to cover his tracks.
Isnt it illegal for people to do that? Cant i complain to the police and my internet service provider to catch the people who did this?
 
Old 02-11-2009, 07:26 PM   #23
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by neilcpp View Post
The logs on the router was clear. The sonofabitch that hacked me probably cleared the logs to cover his tracks.
Isnt it illegal for people to do that? Cant i complain to the police and my internet service provider to catch the people who did this?
Depends on the laws where you live. But generally speaking, the authorities would require some kind of evidence in order for an investigation to start (that is, assuming they consider your case merits one in the first place). So far, it doesn't look like you have any evidence at all. That's why some of us are not so sure about what happened here.
 
Old 02-11-2009, 07:43 PM   #24
larryhaja
Member
 
Registered: Jul 2008
Distribution: Slackware 13.1
Posts: 305

Rep: Reputation: 80
Quote:
Originally Posted by neilcpp View Post
so i guess i take a George W Bush approach to this issue:
"You fool me once, shame on you, You fool me twice, shame on me".
Actually I think the saying from G-dub was:
"Fool me once...shame on...shame on you. You fooled me. You can't fool me again."
http://www.youtube.com/watch?v=eKgPY1adc0A
 
Old 02-11-2009, 08:01 PM   #25
Matir
LQ Guru
 
Registered: Nov 2004
Location: San Jose, CA
Distribution: Debian, Arch
Posts: 8,507

Rep: Reputation: 128Reputation: 128
Quote:
Originally Posted by neilcpp View Post
The logs on the router was clear. The sonofabitch that hacked me probably cleared the logs to cover his tracks.
Isnt it illegal for people to do that? Cant i complain to the police and my internet service provider to catch the people who did this?
Yes, highly illegal. But without logs, there's no evidence to show that anything illegal happened, let alone determine who is responsible for it.
 
Old 02-12-2009, 02:34 AM   #26
nx5000
Senior Member
 
Registered: Sep 2005
Location: Out
Posts: 3,307

Rep: Reputation: 57
Conjecture, speculation...

Quote:
it was accessable from a outside portscan - ports 23 telnet and port 80.
How did you check it!? That's what win32sux and chort asked.

Quote:
my whole account has been compromised for several months.
Quote:
i know i should have saved the logs first but i could not wait
Right, if you've been compromised for months, then one or two days wouldn't have changed that much.. at least we would have something to discuss about.

Quote:
The IP number was on the page for my LAN set up. In addition, ive been looking at my firewall logs and it says i have 'active connections' to a particular host in the USA- on another box in my lan.
Where, which IP, which port.

Quote:
and its not even made public by anyone so people can avoid this problem.
It's public, in the manual that comes with your device.

But still, your conclusions:

Quote:
Im CERTAIN ive been infiltrated.
Quote:
i never noticed someones (lame) attempt to route my traffic to some ip until yesterday though..
You might have heard about SSL. Technically they can not snoop on every kind of traffic without you getting a big fat warning on your screen.
 
Old 02-12-2009, 03:02 AM   #27
JulianTosh
Member
 
Registered: Sep 2007
Location: Las Vegas, NV
Distribution: Fedora / CentOS
Posts: 674
Blog Entries: 3

Rep: Reputation: 90
Quote:
Originally Posted by nx5000 View Post
You might have heard about SSL. Technically they can not snoop on every kind of traffic without you getting a big fat warning on your screen.
not necessarily so... it's unlikely, but if his box was indeed owned, there are trusted store manipulations and MITM techniques that allow the transparent interception and decryption of SSL sessions.
 
Old 02-12-2009, 03:29 AM   #28
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by Admiral Beotch View Post
not necessarily so... it's unlikely, but if his box was indeed owned, there are trusted store manipulations and MITM techniques that allow the transparent interception and decryption of SSL sessions.
What box are you talking about? The PC or the router? Also, please try to be specific and provide links/references whenever you make claims like this. What you've posted could be interpreted in many different ways. Yes, if his PC was owned then the bad guy could sniff his SSL traffic before it's encrypted and after it's decrypted. If the bad guy owns the router and wishes to sniff there instead, then he could also create a MITM attack by making the PC accept his digital certificate (either through social engineering or manually if he owns the PC too). But neither of these attacks would involve the decryption of the kosher SSL sessions, which is what it kinda sounds like your implying would.

Last edited by win32sux; 02-12-2009 at 03:53 AM.
 
Old 02-12-2009, 04:04 AM   #29
JulianTosh
Member
 
Registered: Sep 2007
Location: Las Vegas, NV
Distribution: Fedora / CentOS
Posts: 674
Blog Entries: 3

Rep: Reputation: 90
Quote:
Originally Posted by win32sux View Post
What box are you talking about? The PC or the router? Also, please try to be specific and provide links/references whenever you make claims like this. What you've posted could be interpreted in many different ways. Yes, if his PC was owned then the bad guy could sniff his SSL traffic before it's encrypted and after it's decrypted. If the bad guy owns the router and wishes to sniff there instead, then he could also create a MITM attack by making the PC accept his digital certificate (either through social engineering or manually if he owns the PC too). But neither of these attacks would involve the decryption of the kosher SSL sessions, which is what it kinda sounds like your implying would.
I'm talking about both the router and the dude's workstation.

http://www.pburkholder.com/sysadmin/...m/SSL-mitm.php

Specifically...
Quote:
An even greater risk is posed by unprotected systems where an attacker can preload his/her own trusted root authority certificates. In public environments such as libraries and computer labs, there is little to prevent such an attack from taking place. Casual observation of such places indicates that an attacker would see them as low-risk, high-opportunity environments.
 
Old 02-12-2009, 04:15 AM   #30
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by Admiral Beotch View Post
I'm talking about both the router and the dude's workstation.

http://www.pburkholder.com/sysadmin/...m/SSL-mitm.php

Specifically...

An even greater risk is posed by unprotected systems where an attacker can preload his/her own trusted root authority certificates. In public environments such as libraries and computer labs, there is little to prevent such an attack from taking place. Casual observation of such places indicates that an attacker would see them as low-risk, high-opportunity environments
For this attack to work it would require the PC to be owned. The attacker is simply pre-accepting the bogus certificate prior to the MITM attack. No decryption of kosher SSL sessions is happening, the victim is simply starting a bogus SSL session with the attacker. This kind of attack can be carried out without needing to own the router.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Is it really an important security update? Berosus Ubuntu 1 11-17-2007 12:08 PM
''Help Me!!'' pls..this is a very important firmware/router project babyswan Linux - Software 8 07-24-2007 07:40 PM
''Help Me!!'' pls... This is a very important firmware/router project.. babyswan Programming 3 07-23-2007 01:37 AM
What updates fix security issues and what are less important? decrepit Fedora 1 02-03-2007 06:21 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:58 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration