LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-27-2008, 05:29 PM   #1
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
SSH Key-based Attacks (Phalanx2 rootkit)


For those that didn't pick this up already, US-CERT reported yesterday:
"US-CERT is aware of active attacks against linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access to a system, and then uses local kernel exploits to gain root access. Once root access has been obtained, a rootkit known as "phalanx2" is installed." Full text is at http://www.us-cert.gov/current/archi..._based_attacks.


We added Phalanx to Rootkit Hunter (RKH) back in 2006, RKH does /dev/shm checks for some time now and utilises 'unhide' where possible for hidden process checks. Today RKH CVS sees Phalanx2 added Rootkit files and directories, cd'ing into directories and Inode tests. Please see the updated RKH CVS tarball at http://rkhunter.sourceforge.net/rkhunter-CVS.tar.gz

* Please test the tarball as we're close to releasing 1.3.4. This version adds among other things: support for TCB shadow files, DB_PATH write test vs database on read-only media (Debian), Vampire and Intoxonia-NG LKM's.

Last edited by unSpawn; 08-28-2008 at 02:02 AM. Reason: Call for testing
 
Old 08-28-2008, 02:43 AM   #2
Wakil
LQ Newbie
 
Registered: Apr 2008
Distribution: Fedora core 8
Posts: 18

Rep: Reputation: 0
Wink phalanx2

this is very interesting and scary at the same time, i still don't understand how the things works Because to get those SSH keys in the first place they had to be vulnerable to capture. And, guess what? In the last few months there have been two occasions when it's been revealed that certain Linux distributions were wide open to attack.

The first time was when Debian, thanks to some really fouled up development thinking left OpenSSL on Debian, and related distributions like Ubuntu, wide open for attacks from September 17th 2006 until May 13th 2008. OpenSSL provides SSL (Secure Socket Layer) and TLS (Transport Layer Security) protection. It's used through Linux internally and in network communications for 'secure' transactions.

Then, much more recently, Red Hat's RHEL (Red Hat Enterprise Linux) and Fedora were briefly compromised. In these cases, Red Hat says some, not many, but some OpenSSH packages had been messed around with.

"No problems," said Red Hat. Funny that a few days later we're seeing successful SSH attacks on Linux servers isn't it?
 
Old 08-29-2008, 01:04 PM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by Wakil View Post
Funny that a few days later we're seeing successful SSH attacks on Linux servers isn't it?
Yes, that's "funny". However you should also realise that associating things and making assumptions is typically human. It saves us time but when trying to link two situations together without knowing the facts it could lead to making mistakes. In the over-hyped "I have no news so I'll write about you having news" web log infosphere of today one should take care not to instill fear, uncertainty and doubt.

Last edited by unSpawn; 08-29-2008 at 01:05 PM.
 
Old 08-30-2008, 01:45 AM   #4
Wakil
LQ Newbie
 
Registered: Apr 2008
Distribution: Fedora core 8
Posts: 18

Rep: Reputation: 0
"fear" huh?

No idea wot you ment there. But one word cought my attention "FEAR" such nice a word is it? let me tell you this for those who practiced medicine we were told to leave that word by the door before enterring the work place, becouse that word could get you in trouble, but i gues in linux thats a complete different thingy right? i mean is just a machine afterall except if it is a server running some firewalls in a president room or some sord of a server holding some medical details about the hospital.

regards
 
Old 08-30-2008, 02:15 AM   #5
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by Wakil View Post
No idea wot you ment there. But one word cought my attention "FEAR" such nice a word is it? let me tell you this for those who practiced medicine we were told to leave that word by the door before enterring the work place, becouse that word could get you in trouble, but i gues in linux thats a complete different thingy right? i mean is just a machine afterall except if it is a server running some firewalls in a president room or some sord of a server holding some medical details about the hospital.
I think what he was essentially telling you was that you need to be extremely cautious when making posts like this. I mean, your post was dripping uncertainty from every pore. I would think that when you studied medicine they taught you that making connections between situations without evidence or further investigation can cost someone dearly. The same concept applies in information security. Let's try and stick to the facts as much as we can before we let our minds wander through the FUD.

Last edited by win32sux; 08-30-2008 at 02:17 AM.
 
Old 09-01-2008, 08:16 AM   #6
Wakil
LQ Newbie
 
Registered: Apr 2008
Distribution: Fedora core 8
Posts: 18

Rep: Reputation: 0
Ok,unspawn i've got Rootkit Hunter (RKH) and i've check my system and it gave me some [Warning] massagaes in some directories, now i wanted to know how do i repair to remove that [warning] sign so that nextime i check the system it won't give that warning.
i'll give a sample report i have.

report :-

[01:34:02] Checking for passwd file changes [ Warning ]
[01:34:02] Warning: Users have been added to the passwd file:
[01:34:02] XXXX:X:XXXX:XXXX:XXXX X,X,cell number,:/home/XXXX:/bin/bash
[01:34:02] Info: Starting test name 'group_changes'
[01:34:02] Checking for group file changes [ Warning ]
[01:34:02] Warning: Groups have been added to the group file:
[01:34:02] XXXX:X:XXXX:
[01:34:02] Checking root account shell history files [ None found ]
[01:34:02]
[01:34:02] Performing system configuration file checks
[01:34:02] Info: Starting test name 'system_configs'
[01:34:02] Checking for SSH configuration file [ Found ]
 
Old 09-01-2008, 12:24 PM   #7
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415

Original Poster
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by Wakil View Post
it gave me some [Warning] massagaes in some directories, now i wanted to know how do i repair to remove that [warning] sign so that nextime i check the system it won't give that warning.
So what happens if you run it again?
 
Old 09-02-2008, 01:50 AM   #8
Wakil
LQ Newbie
 
Registered: Apr 2008
Distribution: Fedora core 8
Posts: 18

Rep: Reputation: 0
It gives me the same result. as the old one.
 
Old 09-11-2008, 03:54 PM   #9
utlemming
LQ Newbie
 
Registered: Sep 2008
Posts: 1

Rep: Reputation: 0
Non-issue really

Rootkits are pretty scary. But anyone with any experience with SSH key knows that the rootkit using stolen SSH keys is only an issue on system where the keys have been compromised. A person using SSH keys with out a challenge password is asking for trouble. The keys are effectively the same thing as having a set of car keys -- if a bad guy gets them they get in the car and drive it away.

If you are using a version of SSH that has been compromised (like the Debian SSL issue a little back would be bad.

Those deep in the Linux community are pretty much laughing at CERT for this. The rootkit itself isn't using kernel bug or an SSH flaw. CERT issued an advisory because it might happen. The moral of the story -- keep your SSH keys safe, use a challenge password and on system critical boxes, follow good security practices. Besides, there is a reason why large companies lock their internet servers behind a Bastion Server/VPN. SSH being exposed to the real world is considered a bad idea in the first place.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Why do most SSH attacks seem to come from Asian countries? SlowCoder Linux - Security 7 05-08-2008 06:32 AM
Problem with two-way key-based ssh connection kaplan71 Linux - Networking 4 02-22-2007 07:15 AM
LXer: Key-Based SSH Logins With PuTTY LXer Syndicated Linux News 1 12-10-2006 11:21 AM
Need to monitor SSH attacks with Sebek ActiveX Linux - Security 6 10-14-2006 02:49 AM
Growing ever concerned about attacks on SSH impulse() Linux - Security 2 09-11-2006 03:34 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:23 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration