LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-29-2002, 08:29 AM   #16
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Re: I got this too?


Originally posted by doris
()My question is how this happened. My computer is behind a linksys router and the router functions as a firewall using NAT (Network Address Translation).()

Do you allow for any services (telnet, ftp, smtp, dns, rpc, http, etc etc whatever else) to be reached behind the Linksys? Any service accesable by outside 'net users may serve as a target.

In short, check the CERT docs earlier in this thread, disconnect the box from the network, restart with a bootable cd with emergency shell (your distro's cdrom) and run chkrootkit. If you find evidence your box was compromised, save your *human readable* data (no binaries) and re-install from scratch, preferably a recent distro version.

Set up your system again using different passwords, harden your distro using Bastille-linux(.org) or from the links below, keep up with application vulnerabilities tru your vendors or general mailinglists, add some form of file integrity checking like Aide, Tripwire. Add some form of intrusion detection preferably Snort not Portsentry.

LASG: Linux Administrator's Security Guide,
Security Quick-Start HOWTO for Linux,
Armoring Linux,
SAG: The Linux System Administrator's Guide,
The SANS Reading room: Linux issues,
Bastille Linux Hardening System,
Elementary security for your Linux box.
Securityfocus.com vulnerabilities by Bugtraq/CVE ID,
SecFocus UNIX,
Xforce.

HTH somehow.
 
Old 05-29-2002, 08:37 AM   #17
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Originally posted by MartBrooks
()"firewall" is a much overused and much misunderstood term()

I agree it's being viewed somewhat like a Holy Grail of protection. Whatever is not denied passing tru the fw can harm the system, and when the cracker has a foothold the box *will* be 0wned in no time.

Hardening/securing the system and kernel should be promoted more I guess...
 
Old 05-29-2002, 11:37 AM   #18
MartBrooks
Member
 
Registered: May 2002
Location: London
Distribution: Debian
Posts: 388

Rep: Reputation: 31
Great, good luck.
 
Old 05-29-2002, 11:57 AM   #19
Noerr
Member
 
Registered: May 2002
Location: Dalec, HU
Distribution: Redhat 7.3
Posts: 696

Original Poster
Rep: Reputation: 30
>>unSpawn "weird files like the ".ttyaa" you mentioned? >>Ran "strings" on it?"
unSpawn, what did you mean by run strins on it?
 
Old 05-29-2002, 12:27 PM   #20
MartBrooks
Member
 
Registered: May 2002
Location: London
Distribution: Debian
Posts: 388

Rep: Reputation: 31
He meant run "strings" which is a UNIX command line utility to extract ASCII text blocks from binary files.

Regards
 
Old 05-29-2002, 02:07 PM   #21
doris
Member
 
Registered: May 2001
Location: New York, USA
Distribution: RH 7.3, 8.0
Posts: 64

Rep: Reputation: 15
In secure log, I found sshd was invoked from ips belonging to California, Brazil, China and Korea. There was also an SSH-1.0-Version_Mapper scan. I noticed the file permission changed shortly (one day) after this scan. As unSpawn pointed out, any services could be used as a door. I did enabled ip forwarding to the linux box.

Another question, if I want to secure one unix machine by making it invisible and inaccessible from outside, can I just achieve it in the gateway setup of this machine?

Doris
 
Old 05-30-2002, 12:24 AM   #22
Noerr
Member
 
Registered: May 2002
Location: Dalec, HU
Distribution: Redhat 7.3
Posts: 696

Original Poster
Rep: Reputation: 30
doris:
once your machine is hacked, you will have a tough time to clean in it up, and trying to get rid of hackers, you'll *iss 'em off and they may screw your system up badly, so before do anything backup your system.
I had a case long time ago (in times of RH6-my startup with linux), when my machine was hacked, and I started to clean up everything I saw, they didn't like it I guess, and setup my machine, so I couldn't login locally (I saw login screen but it was just a picture), and shut down ssh, so I was cut off completely. Then thanks to a good friend of mine, security expert (ex hacker), he hacked into system from network, and got things straight, because I was lost completely

so be carefull
 
Old 05-30-2002, 02:31 AM   #23
MartBrooks
Member
 
Registered: May 2002
Location: London
Distribution: Debian
Posts: 388

Rep: Reputation: 31
It's worth repeating this: If you suspect your machine has been compromised, the only way to ensure your still have control of it is to format the disk and re-install.
 
Old 05-30-2002, 09:26 AM   #24
Noerr
Member
 
Registered: May 2002
Location: Dalec, HU
Distribution: Redhat 7.3
Posts: 696

Original Poster
Rep: Reputation: 30
or rather take another hdd for you server.
Take the old one back home, and try to learn from your/their mistakes, and correct yours before they are in your system again.
 
Old 05-30-2002, 11:08 PM   #25
rverlander
Member
 
Registered: May 2002
Distribution: A few
Posts: 488

Rep: Reputation: 30
Theres a security hole in SSH 2.4
 
Old 05-31-2002, 03:48 AM   #26
Noerr
Member
 
Registered: May 2002
Location: Dalec, HU
Distribution: Redhat 7.3
Posts: 696

Original Poster
Rep: Reputation: 30
that may be the cause for my intrudors (i had ssh2.4 installed)
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
How do I proceed with installation of packages? anindyanuri Linux - Software 9 05-03-2005 07:59 AM
Installation crashed - how to proceed? Transition Linux - Newbie 2 01-31-2004 05:22 PM
Need some advice on how to proceed with -> proendo Slackware 1 01-27-2004 10:46 AM
Post-Install ... How Do I proceed? svarreby Slackware 3 01-10-2004 11:33 AM
How should i proceed? BajaNick General 6 12-07-2003 07:21 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:54 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration