On Wed, Sep 01, 2004 at 12:25:19AM +0200, Timo Veith wrote:
> On Tuesday 31 August 2004 03:24, Marcin Owsiany wrote:
> > On Tue, Aug 31, 2004 at 12:59:48AM +0200, Timo Veith wrote:
> > > On Monday 30 August 2004 21:06, Marcin Owsiany wrote:
> > > I added a iptables rule to the OUTPUT chain dropping all tcp packets 
> to
> > > that box:port and guess what? My server was back idle again. No more 
> 99 %
> > > cpu usage and the process now sits there.
> >
> > Seems like the process is a DoS zombie. Probably it opened as many
> > connections to that machine, as possible, and that caused the heavy CPU
> > utilization.
> 
> Hmm, there wasn't much network traffic, at least not significantly more 
> than some other time.

A DoS does not necessarily mean a lot of traffic byte-wise. Remember
that it only takes 2 packets sent and one received to initiate a TCP
connection. And creating a huge number of connections certainly can be
considered a DoS.

But anyway.. who knows... maybe it was a broken worm or something..

> There's more interessting news:
> As I stopped apache, the other apache proc immediately took port 443 and 
> listened on it. A little while later also port 80 was in use. I connected 
> to both of them with a browser and with telnet but there was no response.
> 
> This fact made me think, that someone really hacked me, because port 80 
> and 443 can only be opened with root permissions.

Had the apache you shut down been listening on port 443?

I suspect there is an exploit which somehow "infects" an apache process
(probably by exploiting some PHP memory management bug) and takes over
the port when apache shuts down. I say so because I have seen such
situations two times myself, and there also was no other sign of the
attacker gaining root access.

Marcin
-- 
Marcin Owsiany <[EMAIL PROTECTED]>             http://marcin.owsiany.pl/
GnuPG: 1024D/60F41216  FE67 DA2D 0ACA FC5E 3F75  D6F6 3A0D 8AA0 60F4 1216


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to