[CLUE-Tech] Hacker question
David Anselmi
anselmi at americanisp.net
Fri Aug 1 10:09:11 MDT 2003
Mike Staver wrote:
> I have had 3 RedHat 7.3 boxes apparently comprised on my network this
> week alone.
What evidence do you have from the boxes to indicate they've been
compromised? You might want to image the drives before you rebuild
them, to preserve what evidence you have. Probably you don't have time
to do the forensics yourself but you might try calling a consultant.
[...]
> Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
> Host blah (xx.xx.xx.xx) appears to be up ... good.
> Initiating SYN Stealth Scan against www1.globaltaxnetwork.com (xx.xx.xx.xx)
Good thing you blanked out the IP ;-)
[...]
> Whoever comprimised my machine, did it with only ports 443 and 80 open
> to it through my firewall.
Perhaps your firewall has more open than that. Have you tested it?
Perhaps the attack came from behind the firewall. Perhaps the attack
came from a local user (much easier to compromise a machine from a shell
account than over a network).
> I have no idea how this happened. I have
> the latest apache from RedHat, is that verion suseptible to a buffer
> overflow of some kind that I'm unaware of?
How quickly do you update the boxes after an errata is available?
Perhaps the boxes were compromised before you updated to the latest.
Staying up to date on security issues is difficult (the above mentioned
consultant can help you find what you missed). I usually just watch the
RHN reports and decide whether they apply to me or not. If 7.3 isn't
supported anymore you'll just have to do the work to upgrade.
> And
> what happens when these boxes get comprimised is that my routers get
> shut down because they are apparently ddos'n grc.com. I see a lot of
> ircd traffic on port 6667, and many other ports as well.
What does "my routers get shut down" mean? Why does your firewall let
DDOS traffic out from your servers? You aren't clear about whether the
6667 traffic is to or from your servers, but you could block that as
well. Might not stop the compromises, but could limit the impact.
[...]
> Besides upgrading to RedHat 9 on these boxes (which isn't an option
> yet), how can I protect myself, and who should I report this activity
> to?? I now don't get to go home tonite to spend time with my family, I'm
> forced to rebuild these damned boxes from scratch once again.
The current state of the art is to patch security holes before they are
exploited. So my philosophy is that if you have a port open to the
Internet it is only a matter of time before you lose the box, no matter
what you do to protect it. Which means you absolutely have to have a
recovery process that is quick and easy (and tested).
Security is a hard business. Seems like you might be best off getting help.
Dave
More information about the clue-tech
mailing list