Michael, Andrew, Fred, and Mark, first of all, thank you for your rapid response to my append to this list. All your comments were constructive, and helpful.
Do I have any reason to think that this is an OpenSSL bug? No - I have my doubts. If this was an OpenSSL bug in the wild, I am sure that this list would be full of appends about it. What makes me think it might be, is
1. The quoted(might be false trail) modus operandi of the hackers - use an openssl scanner, get in and then do a root exploit . . . 2. The first attack followed this MO impeccably, but I only have myself to blame for not being up to date. The first attack downloaded files - like telnet, and some backdoors to /tmp. All files were nobody nogroup. A root exploit was downloaded, and my machine was theirs. 3. The system was rebuilt, except for the Apache sub-system, and was not attacked . No data files from the original incarnation of the system were installed on the machine. All code restored was from the development site, and could not possibly have been corrupted. The system was online for 3 days without Apache/OpenSSL. Apache without OpenSSL was up and down several times. Nothing was attacked. Within two hours of the Apache/OpenSSL service being restored, the system was attacked in the manner described in the original append. 4. In the second attack, the kernel was protected from the root exploit to which it was vulnerable in the first attack. In this attack, files were also downloaded to /tmp, but the crackers were unable to gain root access(I think!!), at least I have no evidence of this. All the files down loaded were once again user/group nobody/nogroup. there were some traces of the attacker trying to damage files, but getting rejected due to not having the appropriate permissions. 5. The attackers in their publicity on their own site do not (apart from their claims of omnipotency) claim to be capable of attacking 0.9.7c it may be that their particular scanner was capable of attacking 9.7c, be they themselves were not aware of it (if (it was && if they were) { I'm sure there would have been a lot of noise})
Could be interesting know the url of this site... Obviously a visit must be done with an anonymizer proxy in the middle... :-)
...omissis...
-- Dott. Sergio Rabellino
Technical Staff Department of Computer Science University of Torino (Italy)
http://www.di.unito.it/~rabser Tel. +39-0116706701 Fax. +39-011751603
______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]