LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-30-2013, 06:46 AM   #1
windstory
Member
 
Registered: Nov 2008
Posts: 489

Rep: Reputation: 36
Is this attacked message at log?


I have a strange log message. My box is centos x86 5.6 and XAMPP 1.68a (PHP 5.2.6, PHP 4.4.9, MySQL 5.0.)

Quote:
Nov 26 11:32:03 myserver named[2395]: zone 0503.pass.as/IN: loaded serial 2009081016
Nov 26 11:32:03 myserver named[2395]: zone japan001.pass.as/IN: loaded serial 2009081016
Nov 26 11:32:03 myserver named[2395]: zone usakorea.pass.as/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone 12d.cssa.c0m.at/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone 12g.cssa.c0m.at/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone rooting.isgre.at/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone patanaso.ircd.lowestprices.at/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone scifi.pages.at/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone active.homes.com.au/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone 72dpi.net.au/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone aq.dyns.be/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone code.dyns.be/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone inger.be/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone cherok.prout.be/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone power.prout.be/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone ftp.scarlet.be/IN: loaded serial 2009081016
Nov 26 11:32:04 myserver named[2395]: zone sniff.your-tu.be/IN: loaded serial 2009081016
If system files were contaminated, please let me know how to cure it.

Thanks in advance.
 
Old 04-30-2013, 07:17 AM   #2
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,842

Rep: Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308Reputation: 7308
Nov 26? otherwise it is not enough to say anything. See the man page of named and check how it was configured.
 
1 members found this post helpful.
Old 04-30-2013, 07:20 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
These messages mean your ISC BIND loaded zone files OK.

Problem I.
You should not be having nor loading zone files you're not the authoritative domain name server for. Being able to dump files on the system can be done by anyone with access (Apache user) and anyone with access to the 'logger' binary could potentially pollute log files with fake messages) but being able to have BIND load them zone files requires root rights (or a thoroughly fscked up system). (Of the 7-ish host names I checked four were unreachable, at least one has been domain-parked for ages, one has been hosted in the by-default-suspect AS numbers 4134 and 28753 and two ranges have records wrt malware.)


Problem II.
You should not have been running XAMPP (regardless of any arguments): even the developers say XAMPP is only for development. To drive the point home: your version was released on September 24th 2008 and 1.8.2-beta1 was released on February 10th 2013.

I'll post instructions in a minute but let this sink in before somebody else comments.

Last edited by unSpawn; 04-30-2013 at 07:54 AM. Reason: //add clause, add DN nfo.
 
1 members found this post helpful.
Old 04-30-2013, 08:04 AM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by windstory View Post
If system files were contaminated, please let me know how to cure it.
Let me first tell you that's not the goal of this thread. The goal is to find out if your system was compromised, how and how to avoid that next time, meaning you'll prepare yourself to rebuild the machine from scratch should we find enough evidence of a root compromise. Oh, and BTW, your CentOS version isn't up to date either: CentOS 5.9 was released a month or so ago.

So. What are you going to do? Here's what:
0. Do nothing on the system. First read the Intruder Detection Checklist (CERT): http://web.archive.org/web/200801092...checklist.html. While old it will still provide you with steps to take if you're not accustomed to performing analysis. Do not remove, update or install anything on the web server. If you already did stuff do let us know what exactly.
1. Notify any users of that system to avoid using it (no logging in, no uploading, no nothing) until you have verified the system was or was not compromised.
2. Save listings for later use:
Code:
( \ps axfwwwe -opid,ppid,gid,uid,cmd 2>&1; \lsof -Pwln 2>&1; \netstat -anTpe 2>&1; \lastlog 2>&1; \last -wai 2>&1; \who -a 2>&1 ) > /tmp/output.txt
3. Mitigate the situation by stopping any (publicly) accessible services like the web server, database, FTP. Keep SSH running if the machine is in a remote location or only accessible over the network. If necessary raise the firewall to only allow traffic to and from your (management) IP (range).

4. Build an understanding of the situation:
- what services are (publicly) accessible?
- what applications and what version of them run in the web stack other than XAMPP? (Include web-based management panels, statistics, web log, forum, shopping cart, plugins, themes, homebrewn scripts and other software if any),
- apart from XAMPP, was any software kept up to date?
- which access restrictions are in place and what hardening was performed?
- how far back do your system and daemon logs go?
- have security incidents happened before on this server?
- have you, apart from the zone files, found any other suspicious files?
- depending on where you found the zone files run 'find' on that and other common directories holding temporary files, docroots, user-owned files: (example showing /var/www, /var/tmp, /tmp and /home: adjust it):
Code:
find /var/www /var/tmp /tmp /home -printf "%T@ %A@ %C@ %u %g %m %y \"%p\"\n" 2>&1 >> /tmp/output.txt
and save the /tmp/output.txt file to your log analysis workstation.
- get all the system and daemon logs off of the system and onto a physically different machine you will use for log analysis.
- on your log analysis workstation run all log files from the host through Logwatch with the "--detail High --service All --range All --archives --numeric --save /tmp/logwatch.txt" args.

Now attach (or pastebin) "output.txt" and "/tmp/logwatch.txt".


*Please be complete and verbose in your reply, please stay with the thread until completion, respond as soon as replies are posted and ask questions if unsure beforehand.

Last edited by unSpawn; 04-30-2013 at 08:17 AM. Reason: //More *is* more
 
1 members found this post helpful.
Old 04-30-2013, 10:42 AM   #5
windstory
Member
 
Registered: Nov 2008
Posts: 489

Original Poster
Rep: Reputation: 36
unSpawn/

I appreciate for your valuable reply.
I'll study and follow step by step, and post here the result.
 
Old 04-30-2013, 04:37 PM   #6
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
I'm sorry but running these commands should not take you hours and hours.
So come on and post your stuff.
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
neat command not working azx_get_response timeout message in /var/log/message ninadshaha Red Hat 1 02-19-2008 02:32 PM
Strange Repeating Error message in /var/log/message lucktsm Linux - Security 2 10-27-2006 08:29 AM
Welcome Message after log in pxumsgdxpcvjm SUSE / openSUSE 1 09-20-2006 11:34 AM
message, message.1 in /var/log/ can be deleted for space? phpsharma Linux - Newbie 4 11-17-2004 12:23 PM
/var/log/kern.log message dimkal Linux - Hardware 1 05-08-2004 06:57 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:54 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration