hi ya johannes

On Mon, 2 Feb 2004, Johannes Graumann wrote:

> > > Checking 'bindshell'... INFECTED [PORTS:  1524 31337]
> At this point I believe to be able to attribute this to portsentry
> running - '/etc/init.d/portsentry stop' makes it go away,
> '/etc/init.d/portsentry start' makes it reappear and I can create the
> message on a pristine system by installing portsentry (running in the
> default configuration).

odd that portsentry does that... oh welll ... 
 
> > 'tiger' also reports - while performing signature check of system
> > binaries, that /bin/ping, /usr/bin/chage, /usr/bin/at, /usr/bin/write
> > and /usr/bin/inetd don not match. This can not be confirmed by aide
> > (cd-burned database, unsafe binary) or debsums (unsafe binary).
> Javier stated as well:
> > Do _not_ rely on that if you are _not_ using a stable system.... (and
> > really, even then, unless you've regenerated the database yourself).
> This is a testing/unstable system.

that doesn't explain why the semi-important binaries are not as
you expected ... you still need to confirm the size/md5 of the binaries
against a clean system and/or patched updated/upgraded box
 
> If you don't buy this: please let me know and why. Since We are talking
> 20+ systems being dependent on one of the machines in question, I'm
> considering myself biased due to installation anxiety.

maybe its time to spend an extra $300 for a 2nd backup machine and
keep it offline or more protected behind another secure firewall
        - and also time to put all your binaries compressed onto cdrom
        so that you can trivially compare binaries in a few seconds
        and know if its been hacked or not

        - you'd also need to know which binaries changed on which date
        from which package :-)

have fun
alvin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to