Fred Merritt wrote:
Michael, Andrew, Fred, and Mark,
                                                      first of all,
thank you for your rapid response to my append to this list.  All your
comments were constructive, and helpful.

Do I have any reason to think that this is an OpenSSL bug?
No - I have my doubts.  If this was an  OpenSSL bug in the wild, I am
sure that this list would be full of  appends about it.  What makes me
think it might be, is

  1.  The quoted(might be false trail) modus operandi of the hackers -
     use an openssl scanner, get in and then do a root exploit . . .
  2. The first attack followed this MO impeccably, but I only have
     myself to blame for not being up to date.  The first attack
     downloaded files - like telnet, and some backdoors to /tmp.  All
     files were nobody nogroup.  A root exploit was downloaded, and my
     machine was theirs.
  3. The system was rebuilt, except for the Apache sub-system, and was
     not attacked .  No data files from the original incarnation of the
     system were installed on the machine. All code restored was from
     the development site, and could not possibly have been corrupted.
     The system was online for 3 days without Apache/OpenSSL.  Apache
     without OpenSSL was up and down several times.  Nothing was
     attacked.  Within two hours of  the Apache/OpenSSL service being
     restored, the system was attacked in the manner described in the
     original append.
  4. In the second attack, the kernel was protected from the root
     exploit to which it was vulnerable in the first attack.  In this
     attack, files were also downloaded to /tmp, but the crackers were
     unable to gain root access(I think!!), at least I have no evidence
     of this.  All the files down loaded were once again user/group
     nobody/nogroup.  there were some traces of the attacker trying to
     damage files, but getting rejected due to not having the
     appropriate permissions.
  5. The attackers in their publicity on their own site do not (apart
     from their claims of omnipotency) claim to be capable of attacking
     0.9.7c  it may be that their particular scanner was capable of
     attacking 9.7c, be they themselves were not aware of it (if (it
     was && if they were) { I'm sure there would have been a lot of noise})
Could be interesting know the url of this site...
Obviously a visit must be done with an anonymizer proxy in the middle... :-)

...omissis...

--
Dott. Sergio Rabellino

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to