Hi Luis: thanks.
> > Did you check to see whether /usr/sbin/apache2 was modified? Or was it > only the running process that had somehow been stack-overflow'd? > I checked the apache using debsums seems ok. shopping:/usr/sbin# debsums apache2-mpm-prefork /usr/sbin/apache2 OK /usr/share/doc/apache2-mpm-prefork/NEWS.Debian.gz OK /usr/share/doc/apache2-mpm-prefork/copyright OK /usr/share/doc/apache2-mpm-prefork/changelog.gz OK /usr/share/doc/apache2-mpm-prefork/changelog.Debian.gz OK How can I check a process being stack-overflowed or not? > IMHO, I'd declare this box as "compromised" and redo the whole thing. > Copy all data to a new box and install tripwire (or something of that > sort), plus follow the Debian security manual to the last bit, before > putting the box online again. will do. I had tripwire turned on before, it seems quite slow. so I turned it off. > > A few links: > > http://www.debian.org/doc/manuals/securing-debian-howto > http://wiki.debian.org/SELinux/Setup > http://wiki.debian.org/Hardening|Hardening<http://wiki.debian.org/Hardening%7CHardening> > great links. > > I know that you already had SELinux enabled (after the fact?). So, you > might already have enough information to build a better box. > Yah, it is a after the fact action. but I have those parameters for SELinux, some lib/apps need that. which may not safe, allow_execstack --> on allow_execmem --> on allow_execmod --> off allow_execheap --> off if the allow_execstack was off and the application was stack over-flowed, will over-flowed code be constrained by SELinux? -- Best Regards Mike