Re: Is this a compromise and how?

2000-12-15 Thread brian

Thanks for all the reponses.

I happened to have /home in its own partition, so I reinstalled from
scratch via CD and installed all the security updates, among a
myriad of other security measures.

I decided not to restore /usr/local from backups, but instead to
rebuild everything in /usr/local from fresh sources.

All those executables and shared libraries in /usr/local just seemed
to risky.

-- 
Brian Litzinger <[EMAIL PROTECTED]>

Copyright (c) 2000 By Brian Litzinger, All Rights Reserved
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: Is this a compromise and how?

2000-12-14 Thread Alan Cox

> > I'm guessing that your ls was also hijacked.  You're using RedHat, so try
> > the rpm -V command
> Once hacked you can't trust anything. A malicious person might just
> install RPMs for example.

There is a proper way to do this. You boot the rescue CD, then do the rpm 
verify of each package with the rpm binary on the CD (static) agains the
package on the CD. 

> Re-install is the only option.

I would advise this however it is not 'only' but 'very good idea'

> Restore backups only after verifying that they do not re-install the

(popular one is roots .login)

Alan

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: Is this a compromise and how?

2000-12-14 Thread Frank van Maarseveen

On Thu, Dec 14, 2000 at 12:58:26AM -0800, Matthew Dharm wrote:
> 
> I doubt that from this description, you've been hacked.  Even if your
> /etc/inetd.conf is in good shape, it looks like someone got in.
> 
> I'm guessing that your ls was also hijacked.  You're using RedHat, so try
> the rpm -V command
Once hacked you can't trust anything. A malicious person might just
install RPMs for example.

Re-install is the only option.

Restore backups only after verifying that they do not re-install the
backdoors as well. This is where your current hacked system may be
useful. Something like the coroners toolkit (?) written by Wietse Venema
(and others?) might help you determining at what date your system has
been hacked. Don't be suprised if you find multiple break-ins accumulated
over the years.

If you have (had) a network: attached systems may have been compromised
as well.

-- 
Frank
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: Is this a compromise and how?

2000-12-14 Thread Dr. Kelsey Hudson

It looks like you've been r00ted, dude!

Someone installed a r00tk1t and you are now seeing the after-effects of
it. What I'd do, in your case:

back up /usr/local, /home, /etc, then reload the system clean, and replace
teh backups. The system should be in a close state (read: no root kit) to
before you reloaded it.

Good luck!

On Thu, 14 Dec 2000 [EMAIL PROTECTED] wrote:

> Sorry is this is too far off topic, but it seems to me the
> kernel may be helping in this break in or maybe some magic
> aspect of the filesystem.
> 
> I noted in an ls that
> 
> -rwxr-xr-x   1 root root36784 Jul 17 05:06 rpc.mountd*
> -rwxr-xr-x   1 root root 3368 Jul 17 05:06 rpc.nfsd*
> -rwxr-xr-x   1 root ftp22 Sep  8 22:15 rpc.rcmd*
> -rwxr-xr-x   1 root root 9872 Jul 17 05:06 rpc.rquotad*
> -rwxr-xr-x   1 root root13936 Feb  9  2000 rpc.rstatd*
> -rwxr-xr-x   1 root root 7952 Feb  9  2000 rpc.rusersd*
> -rwxr-xr-x   1 root root 6512 Feb 11  2000 rpc.rwalld*
> -rwxr-xr-x   1 root root17624 Mar  7  2000 rpc.yppasswdd*
> -rwxr-xr-x   1 root root23984 Mar  7  2000 rpc.ypxfrd*
> -rwxr-xr-x   1 root root10692 Sep  5 16:03 rpcinfo*
> 
> rpc.rcmd look a little suspicious?
> 
> And guess what it contains?
> 
> %cat /usr/sbin/rpc.rcmd 
> /usr/include/strlib.h
> 
> H.
> 
> %ls -l /usr/include/strlib.h
> -rwxr-xr-x   1 root root16768 Sep 16 09:55 /usr/include/strlib.h*
> 
> %file /usr/include/strlib.h
> /usr/include/strlib.h: ELF 32-bit LSB executable, Intel 80386, version 1, 
>dynamically linked (uses shared libs), not stripped
> 
> %/usr/include/strlib.h
> bind: Address already in use
> 
> Now watch this magic trick:
> 
> %mkdir foo
> %cd foo
> %touch strlib.h
> %ls
> %find . -print
> .
> ./strlib.h
> %
> 
> Get it?  strlib.h never appears in the file system via ls whereever
> it may be created.
> 
> More fun:
> 
> %echo hello >strlib.h
> %ls
> %cat strlib.h
> hello
> %
> 
> Pretty cool huh?
> 
> Let me know if you would like a copy of the code.
> 
> A quick strace shows that it binds to port 24000.
> 
> It also contains a list of 5 IP addrs.  I suspect it doesn't
> broadcast, but allows people in from those IPs.
> 
> Anyone know what has happened?  I religiously install the redhat
> updates, and am subscribed to the CERT advistors and install
> the fixes the moment I get them.
> 
> The system was RedHat 6.2, linux 2.2.17pre14 at the time the
> breakin occured.
> 
> I've been running firewalled with only services I provide turned
> on for access, and in /etc/inetd.conf.
> 
> What is keeping strlib.h from appearing ls's?  A hacked ls command?
> 
> 

-- 
 Kelsey Hudson   [EMAIL PROTECTED] 
 Software Engineer
 Compendium Technologies, Inc   (619) 725-0771
--- 

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: Is this a compromise and how?

2000-12-14 Thread Igmar Palsenberg


> Pretty cool huh?
> 
> Let me know if you would like a copy of the code.
> 
> A quick strace shows that it binds to port 24000.
> 
> It also contains a list of 5 IP addrs.  I suspect it doesn't
> broadcast, but allows people in from those IPs.
> 
> Anyone know what has happened?  I religiously install the redhat
> updates, and am subscribed to the CERT advistors and install
> the fixes the moment I get them.
> 
> The system was RedHat 6.2, linux 2.2.17pre14 at the time the
> breakin occured.
> 
> I've been running firewalled with only services I provide turned
> on for access, and in /etc/inetd.conf.
> 
> What is keeping strlib.h from appearing ls's?  A hacked ls command?

Yep. Looks like a rootkit to me.



Igmar

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: Is this a compromise and how?

2000-12-14 Thread Matthew Dharm

On Thu, Dec 14, 2000 at 12:53:46AM -0800, [EMAIL PROTECTED] wrote:
> Sorry is this is too far off topic, but it seems to me the
> kernel may be helping in this break in or maybe some magic
> aspect of the filesystem.

I doubt that from this description, you've been hacked.  Even if your
/etc/inetd.conf is in good shape, it looks like someone got in.

I'm guessing that your ls was also hijacked.  You're using RedHat, so try
the rpm -V command to verify that the ls binary is the same as what should
be in the package.  While you're at it, verify the package is the right one
(compare to a CD or distr ftp site).

Out of curiosity, are you running portmap?  Perhaps BIND?  There are lots
of potential culprits here -- but I suggest you verify all of your binaries
and go back and upgrade everything on your system, as well as re-visit the
issue of what daemons are started up at boot time.

Matt Dharm

-- 
Matthew Dharm  Home: [EMAIL PROTECTED] 
Maintainer, Linux USB Mass Storage Driver

C:  They kicked your ass, didn't they?
S:  They were cheating!
-- The Chief and Stef
User Friendly, 11/19/1997

 PGP signature


Is this a compromise and how?

2000-12-14 Thread brian

Sorry is this is too far off topic, but it seems to me the
kernel may be helping in this break in or maybe some magic
aspect of the filesystem.

I noted in an ls that

-rwxr-xr-x   1 root root36784 Jul 17 05:06 rpc.mountd*
-rwxr-xr-x   1 root root 3368 Jul 17 05:06 rpc.nfsd*
-rwxr-xr-x   1 root ftp22 Sep  8 22:15 rpc.rcmd*
-rwxr-xr-x   1 root root 9872 Jul 17 05:06 rpc.rquotad*
-rwxr-xr-x   1 root root13936 Feb  9  2000 rpc.rstatd*
-rwxr-xr-x   1 root root 7952 Feb  9  2000 rpc.rusersd*
-rwxr-xr-x   1 root root 6512 Feb 11  2000 rpc.rwalld*
-rwxr-xr-x   1 root root17624 Mar  7  2000 rpc.yppasswdd*
-rwxr-xr-x   1 root root23984 Mar  7  2000 rpc.ypxfrd*
-rwxr-xr-x   1 root root10692 Sep  5 16:03 rpcinfo*

rpc.rcmd look a little suspicious?

And guess what it contains?

%cat /usr/sbin/rpc.rcmd 
/usr/include/strlib.h

H.

%ls -l /usr/include/strlib.h
-rwxr-xr-x   1 root root16768 Sep 16 09:55 /usr/include/strlib.h*

%file /usr/include/strlib.h
/usr/include/strlib.h: ELF 32-bit LSB executable, Intel 80386, version 1, dynamically 
linked (uses shared libs), not stripped

%/usr/include/strlib.h
bind: Address already in use

Now watch this magic trick:

%mkdir foo
%cd foo
%touch strlib.h
%ls
%find . -print
.
./strlib.h
%

Get it?  strlib.h never appears in the file system via ls whereever
it may be created.

More fun:

%echo hello >strlib.h
%ls
%cat strlib.h
hello
%

Pretty cool huh?

Let me know if you would like a copy of the code.

A quick strace shows that it binds to port 24000.

It also contains a list of 5 IP addrs.  I suspect it doesn't
broadcast, but allows people in from those IPs.

Anyone know what has happened?  I religiously install the redhat
updates, and am subscribed to the CERT advistors and install
the fixes the moment I get them.

The system was RedHat 6.2, linux 2.2.17pre14 at the time the
breakin occured.

I've been running firewalled with only services I provide turned
on for access, and in /etc/inetd.conf.

What is keeping strlib.h from appearing ls's?  A hacked ls command?

-- 
Brian Litzinger <[EMAIL PROTECTED]>

Copyright (c) 2000 By Brian Litzinger, All Rights Reserved
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/