Re: [Bulk] Re: yum repos urls not working

2014-10-02 Thread lejeczek

On 01/10/14 11:02, lejeczek wrote:

On 30/09/14 12:24, Vladimir Mosgalin wrote:

Hi lejeczek!

  On 2014.09.30 at 11:51:05 +0100, lejeczek wrote next:

you probably have notice yum broke repos config or/and 
something broke in

repos configs or/and in yum
and you get funky urls:

ftp://ftp.scientificlinux.org/linux/scientific/%24slreleasever/x86_64/os/Packages/minicom-2.6.2-5.el7.x86_64.rpm: 

[Errno 14] FTP Error 550 - Server denied you to change 
to the given

directory

quick workaround is to use:
/etc/yum/vars/slreleasever # and value in it
This happened to me after I removed yum-conf-sl7x package 
after updating
actually, the package you mention seems to does exactly it, 
it puts /etc/yum/vars/slreleasever  - so removing it would 
have inverse effect

to RC1 (why? Well, that's how I interpreted release notes
http://ftp.scientificlinux.org/linux/scientific/7.0/x86_64/release-notes/ 

- that I should remove that package to get proper updates 
after RC

release).
well, the thing is I did not remove anything, I've been on 
7roling and after yesterday's yum updates it broke.
It breaks like this after that, and one has to write 
7.0 into
/etc/yum/vars/slreleasever to fix it. Why release notes 
say that we
might need to remove that package and break the system? 
Not sure. Maybe
it's to remind people that this is beta/RC stuff which is 
expected to

break and no one will care :)





Re: Final Solution to Chinese Break in

2014-10-02 Thread Konstantin Olchanski
On Thu, Oct 02, 2014 at 04:02:56PM -0400, Larry Linder wrote:
 on May 22 Our server was broken into by some one in China. ...

By this you mean that you saw IP addresses assigned to an ISP in China,
the actual attackers could have been anywhere in the world, right?

-- 
Konstantin Olchanski
Data Acquisition Systems: The Bytes Must Flow!
Email: olchansk-at-triumf-dot-ca
Snail mail: 4004 Wesbrook Mall, TRIUMF, Vancouver, B.C., V6T 2A3, Canada


Missing images in SL7-rc1 iso ?

2014-10-02 Thread Bill Maidment
Hi
I created a virtual server from SL7-rc1 Everything iso using PXE.
On the PXE server i got these error messages:
[Thu Oct 02 17:18:52 2014] [error] [client 192.168.2.166] File does not exist: 
/var/www/html/iso/SL-7/images/updates.img
[Thu Oct 02 17:18:52 2014] [error] [client 192.168.2.166] File does not exist: 
/var/www/html/iso/SL-7/images/product.img

Should these images be present within the iso?

Regards
Bill Maidment


Re: Final Solution to Chinese Break in

2014-10-02 Thread Nico Kadel-Garcia
On Thu, Oct 2, 2014 at 4:02 PM, Larry Linder
larry.lin...@micro-controls.com wrote:
 on May 22 Our server was broken into by some one in China.   How it happened
 is that we had had a hole in our firewall so employees could access out
 server from the field.   This had worked pretty well - until the AT Motorola
 modem died and they install two new ones and left the port to the ssh open.

*Ouch*. Dude, you've my sympathies. This sort of thing is precisely
why I argue with people about the concept of we have a firewall, so
we don't need to be so rigorous about our internal network security.
And oh, yes, the old standby who would want to hack us?

 The people who did this job had more than a working knowledge of networks,
 Linux and files systems.   We were wondering how they could create a
 directory at end of file system was a puzzle.   They had root privilege, ssh,
 and with access to bash they were in.

And the kernel. Don't forget that with that level of access, they can
manipulate the modules in your kernel.

 How did they covered their tracks so well?  messages was there but filled
 with nonsense and file in /var/log that tells you who and what was sent was
 touched was now missing.   security was there and you could see the

And since they owned root, they could replace core system libraries,
even corrupting compilers. *nothing* rebuilt on that host can be
trusted.

 repeated access attempts to break in again.  cron was changed so daily
 backups were done after they down loaded all new files.   crontab -e no
 longer worked.
 We made a copy of the OS onto old disk and removed disk from the system.
 There were so many charges to the OS and files in /etc that we did not even
 try to repair it.   There were 1000's of differences between new install and
 copy of old system.

 I personally think the bash problem is over blown because they have to get
 threw modem, firewall, ssh before they can use bash.

That is *one* instance, and not really relevant to the circumstances
you described. In fact, many systems expose SSH to the Internet at
large for git repository access, and for telecommuting access to
firewalls and routers. The big problem with shellshock was that
attempts to restrict the available commands for such access, for
example inside ForceCommands controlled SSH authrozed_keys files,
could now broken out of and allow full local shell access. Once you
have *that* on a critical server, your hard crunch outershell is
cracked open and your soft chewy underbelly exposed.

 One question remains and that is what code and script did they use to run the
 system??

Gods only know. there are so *many* rootkits in the wild, and so much
theft of private SSH keys and brute force attacks or theft of
passwords, it's hard to know how they got in.

 If anyone wants details and IP's I will send it to them on an individual
 basis.

 We contacted the FBI and after a telephone interview,  they were sort of
 interested but I think the problem is so big they don't have time to work
 little stuff.

My personal experience with the FBI and computer crime is that they
are simply not competent. They accept information eagerly and do
nothing at all helpful with it. They have a very poor track record of
getting crackers to turn each other in and abusing the resulting
immunity from prosecution, and not actually investigating or
prosecuting more than the tiniest fraction of crimes reported.

 This is a little disjointed because it happened over a long time.

 Larry Linder

As I mention, you have my sympathies. It'a a good reminder to keep
your internal systems updated from known attack vectors.