On Thu, Mar 29, 2001 at 09:45:05PM -0800, John Marsh wrote:
>Well I should have listened to Joe Hartman and installed secure
>shell.  I was busted and someone got into my Cobalt RaQ4 server. 
>They posted a Kill the "[we won't say]" page as the home page
>for each 6 of my virtual sites.  They also changed the root
>password.  What a pain.
>
>So I was wondering what is the best secure shell to use;
>and how can I set up the server to only accept telnet traffic
>from certian IPs?  
>

OpenSSH, the latest version, is probably the ssh of choice; although
Kermit can do encrypted telnet as well.  For the "telnet only from 
12.34.56.78", i would probably do it with tcpd; set up the telnet
or ssh daemon to use tcpd, and in /etc/hosts.allow, allow connection
from the hosts you want; then in /etc/hosts.deny, deny ALL EXCEPT
the hosts you want.

Mike would no doubt do it thru IPMunge in the kernel.

>Yes I'm new to Linux and appreciate any help.  Also what file
>would I look at to see the telnet traffic maybe the guy didn't
>cover his tracks and I could look for patterns in the ip
>addresses.

That would depend on the exact logging setup on your box; i'd start
with /var/log/messages, then /var/log/daemon.log, and the other /var/log
stuff; if you have process accounting, "last" and "lastcomm" can be
helpful, as can shell history files.  If the intruder did any degree of 
cleanup, determining the whole story can be a real pain; it seems one has to 
develop a familiarity with the normal state of one's box, and a zenlike 
awareness of unrightness.
-- 
"There are two major products that come out of Berkeley:
LSD and UNIX.  We don't believe this to be a coincidence."
                -Jeremy S. Anderson

Reply via email to