Good information. Thanks. Please do report them to UU.Net's security
dept.
I caught the guy who tried to email me again with the trojan about 30
minutes after unsuccessfully attempting to login to my system.
(what a dummy he is--hehe)
-=>Jim Roland
"Never settle with words what you can settle with a flamethrower."
--Anonymous
On Wed, 17 May 2000, Julius C. Duque wrote:
> Date: Wed, 17 May 2000 15:47:13 +0800 (PST)
> From: Julius C. Duque <[EMAIL PROTECTED]>
> To: Jim Roland <[EMAIL PROTECTED]>
> Cc: [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED]
> Subject: Re: Gee...guess what?! (was URGENT!!!!!!! Pine hacking attack:
DOS attack, log file attached!)
>
> On Wed, 17 May 2000, Jim Roland wrote:
>
> > Gee guess what!?! I have the guy's IP address and host names. Sorry, I
> > don't remember a guy's name who told me he ran the attachment as root and
> > found a file called ".rhosts", but it might be wise to cronicle your
> > information, look in your logs (messages and syslogs) and send what
> > information you have to Worldcom's Security department (email address noted
> > a few paragraphs below). Also, immediately change all your passwords. If
> > you were in as root, he did get your shadow file, and encrypted passwords
> > *can* be broken. Change them immediately. If the date of your .rhosts
> > file is at or just after the time of the attack, delete it.
>
> That was me. The date of .rhosts on my /home dir was near the time I
> executed the trojan email. I have already deleted that .rhosts. I also
> noticed that sendmail had spawned a child process and was executing a
> program/script ./ex4XXXX or something similar (I can't recall the
> exact filename). I killed it, then decided to reboot the whole system
> afterwards.
>
> The /etc/passwd on my machine have /dev/null for the shell of users.
> Only admins have /bin/bash shells. I also have tcp wrapper installed
> long before this event happened. So, even if this cracker cracks the
> admins' passwords, he still has to login first to our dialup before
> he can telnet to the main server. Of course, I've already changed the
> root's password, as well as informed the other admins to change
> theirs, too. Also, since the shell of "ordinary" users is set to
> /dev/null, a user still cannot enter the server. Without a
> legitimate login shell, the system will just log him/her out
> immediately after logging in. If you want, you could use
> /bin/false instead of /dev/null.
>
> Additionally, it's a good thing that I configured /etc/securetty
> a long time ago so that root can only log on the console. The
> password field on non-human accounts (nobody, guest, ftp, shutdown,
> sync, bin, ftp, etc.) have long been disabled to shut out backdoors.
>
> I have put all users (except for admins) on /etc/ftpusers, chmod 600,
> to prevent non-admins from using the ftp service long before this
> disaster happened. I've also checked my .procmailrc. Why? You could
> execute arbitrary commands using the following .procmailrc recipe:
>
> :0:
> * $ ^Subject:[ ^I]*\/[ ^I].*
> | ${MATCH}
>
> The ^I stands for <tab>. This recipe will execute anything that's
> on the subject line of an email. Imagine if this .procmailrc
> recipe is located on root's directory! Someone just sends an
> email to root with a Subject line: "rm -rf /" and BOOM! By-bye!
>
> About the only thing I regret now is not installing Tripwire beforehand.
> Ouch!
>
> > May 16 16:47:53 ns sendmail[26775]: NOQUEUE: SYSERR: putoutmsg
>(chi-qbu-nvb-vty13.as.wcom.net): error on output channel sending "220 mail.roland.net
>ESMTP Sendmail 8.8.7/8.8.7; Tue, 16 May 2000 16:47:52 -0500": Broken pipe
>
> I've been seeing this IP in /var/log/syslog for about a week now, trying
> unsuccessfully to telnet and ftp to my machine. Yes, you're right,
> this guy came from Chicago.
> >
> > We know he's in Chicago, we have his IP on 2 different occaisons, and know
> > of 2 systems he's hijacked. The 2nd (mediaserve.net) is in California.
>
>
> Julius
>
-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.linux-learn.org/faqs