Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 10:44:10 AM Michael Simpson wrote: > SELinux is great but didn't save Russell Coker from having his play > machine owned with the vmsplice exploit. > http://etbe.coker.com.au/2008/04/03/trust-and-play-machine/ > http://www.coker.com.au/selinux/play.html In this par

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 12:30:27 PM Rui Miguel Silva Seabra wrote: > The fact that they immediately (first thing, actually) did was to > upgrade OpenSSH does suggest that there is a Zero Day bug around. While at first blush that would appear to be so, it may be that the openssh was upgrad

Re: [CentOS] duqu

2011-12-07 Thread Karanbir Singh
On 12/07/2011 06:59 PM, John R Pierce wrote: > > anyways, this is getting very far afield for a centos specific list, and > should instead be discussed on a security list or forum somewhere. I've said this in the past as well - we have some super talent on this list when it comes to admin / mana

Re: [CentOS] duqu

2011-12-07 Thread John R Pierce
On 12/07/11 8:12 AM, Ljubomir Ljubojevic wrote: > Better yet. sshd could be upgraded to have dummy daemon on port 22. He > will accept connections, ask for password but will not be able to > resolve any usernames. Now THAT would be something. heh. connect port 22 to a honeypot running in a VM that

Re: [CentOS] duqu

2011-12-07 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 06:29 PM, Craig White piše: > > On Dec 7, 2011, at 4:49 AM, Johnny Hughes wrote: > >>> There is also use of denyhosts and fail2ban. They allow only few >>> attempts from one IP, and all users can share attacking IP's (default is >>> every 30 min) so you are automatically protected

Re: [CentOS] duqu

2011-12-07 Thread Rui Miguel Silva Seabra
On Tue, 06 Dec 2011 15:45:04 -0600 Johnny Hughes wrote: > On 12/06/2011 02:36 PM, Les Mikesell wrote: > > On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh > > wrote: > >> On 12/06/2011 08:09 PM, Les Mikesell wrote: > >>> Any luck on the specific attack path yet? The linked article > >>> suggests

Re: [CentOS] duqu

2011-12-07 Thread Craig White
On Dec 7, 2011, at 4:49 AM, Johnny Hughes wrote: >> There is also use of denyhosts and fail2ban. They allow only few >> attempts from one IP, and all users can share attacking IP's (default is >> every 30 min) so you are automatically protected from known attacking >> IP's. Any downside on thi

Re: [CentOS] duqu

2011-12-07 Thread Les Mikesell
On Wed, Dec 7, 2011 at 10:12 AM, Ljubomir Ljubojevic wrote: > > Better yet. sshd could be upgraded to have dummy daemon on port 22. He > will accept connections, ask for password but will not be able to > resolve any usernames. Now THAT would be something. Or, it could simply rate-limit failures

Re: [CentOS] duqu

2011-12-07 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 03:37 PM, Bowie Bailey piše: > On 12/7/2011 7:07 AM, Lamar Owen wrote: >> On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: >>> [Changing the port #] is completely and utterly retarded. You have done >>> *NOTHING* to secure SSH by doing this. You have instead ma

Re: [CentOS] duqu

2011-12-07 Thread Michael Simpson
On 7 December 2011 12:46, Lamar Owen wrote: > On Wednesday, December 07, 2011 05:32:00 AM Ljubomir Ljubojevic wrote: >> There is also use of denyhosts and fail2ban. They allow only few >> attempts from one IP, and all users can share attacking IP's (default is >> every 30 min) so you are automatic

Re: [CentOS] duqu

2011-12-07 Thread Johnny Hughes
On 12/07/2011 08:17 AM, Stephen Harris wrote: > On Wed, Dec 07, 2011 at 07:07:33AM -0500, Lamar Owen wrote: >> On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: >>> [Changing the port #] is completely and utterly retarded. You have >> done *NOTHING* to secure SSH by doing this. Yo

Re: [CentOS] duqu

2011-12-07 Thread Bowie Bailey
On 12/7/2011 7:07 AM, Lamar Owen wrote: > On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: >> [Changing the port #] is completely and utterly retarded. You have done >> *NOTHING* to secure SSH by doing this. You have instead made it only >> slightly, and I mean ever so slightly

Re: [CentOS] duqu

2011-12-07 Thread Stephen Harris
On Wed, Dec 07, 2011 at 07:07:33AM -0500, Lamar Owen wrote: > On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: > > [Changing the port #] is completely and utterly retarded. You have > done *NOTHING* to secure SSH by doing this. You have instead made it > only slightly, and I mean

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 07:37:34 AM Always Learning wrote: ... > The essential aspect of this suggestion is such a web site must be Linux > non-denominational. Centos fans working with Ubuntu fans working with > other flavours too including Red Hat et al. A genuine community > Enterprise be

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 05:32:00 AM Ljubomir Ljubojevic wrote: > There is also use of denyhosts and fail2ban. They allow only few > attempts from one IP, and all users can share attacking IP's (default is > every 30 min) so you are automatically protected from known attacking > IP's. Any

Re: [CentOS] duqu

2011-12-07 Thread Always Learning
On Wed, 2011-12-07 at 07:07 -0500, Lamar Owen wrote: > On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: > > A basic qualification to operate a computer would also be nice. Sad > > thing is, there is no such thing. > Microsoft has proposed such... of course, the prerequisites

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 04:59:52 AM Nicolas Thierry-Mieg wrote: > alphanumeric only isn't so secure-seeming is it? Is this for admins who > log in with a cell phone instead of a real keyboard? ;-) > seriously: I thought the consensus was that a secure password should > contain at least on

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: > [Changing the port #] is completely and utterly retarded. You have done > *NOTHING* to secure SSH by doing this. You have instead made it only > slightly, and I mean ever so slightly, more secure. A simple port scan of > your

Re: [CentOS] duqu

2011-12-07 Thread Always Learning
On Wed, 2011-12-07 at 12:59 +0100, Ljubomir Ljubojevic wrote: > Vreme: 12/07/2011 12:53 PM, Always Learning piše: > > > > On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote: > > > >> There is also use of denyhosts and fail2ban. They allow only few > >> attempts from one IP, and all users can share

Re: [CentOS] duqu

2011-12-07 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 12:53 PM, Always Learning piše: > > On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote: > >> There is also use of denyhosts and fail2ban. They allow only few >> attempts from one IP, and all users can share attacking IP's (default >> is every 30 min) so you are automatically protec

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 05:48:24 AM Adam Tauno Williams wrote: > *DISABLE* password authentication on public-facing [and preferably all] > servers. Isn't that securing a server rule#1? Interestingly enough, there are vulnerability scanning tools out there that will flag the lack of a pas

Re: [CentOS] duqu

2011-12-07 Thread Always Learning
On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote: > There is also use of denyhosts and fail2ban. They allow only few > attempts from one IP, and all users can share attacking IP's (default > is every 30 min) so you are automatically protected from known > attacking IP's. Any downside on this pr

Re: [CentOS] duqu

2011-12-07 Thread Johnny Hughes
On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote: > Vreme: 12/07/2011 11:12 AM, Johnny Hughes piše: >> On 12/07/2011 03:59 AM, Nicolas Thierry-Mieg wrote: >>> Lamar Owen wrote: On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote: > I happen to have a copy of an older brute-forcer d

Re: [CentOS] duqu

2011-12-07 Thread Adam Tauno Williams
On Tue, 2011-12-06 at 16:58 -0500, Lamar Owen wrote: > On Tuesday, December 06, 2011 04:45:04 PM Johnny Hughes wrote: > 1.) Keep up to date as much as possible (and a 24 hour window is quite short, > honestly, compared to the timeframes this attack appears to have occupied); > 2.) Keep up with you

Re: [CentOS] duqu

2011-12-07 Thread Adam Tauno Williams
On Wed, 2011-11-30 at 13:05 -0500, m.r...@5-cent.us wrote: > There's an article on slashdot about the Duqu team wiping all their > intermediary c&c servers on 20 Oct. Interestingly, the report says that > they were all (?) not only linux, but CentOS. There's a suggestion of a > zero-day exploit in

Re: [CentOS] duqu

2011-12-07 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 11:12 AM, Johnny Hughes piše: > On 12/07/2011 03:59 AM, Nicolas Thierry-Mieg wrote: >> Lamar Owen wrote: >>> On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote: I happen to have a copy of an older brute-forcer dictionary here (somewhere) and it's very large and

Re: [CentOS] duqu

2011-12-07 Thread Johnny Hughes
On 12/07/2011 03:59 AM, Nicolas Thierry-Mieg wrote: > Lamar Owen wrote: >> On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote: >>> I happen to have a copy of an older brute-forcer dictionary here >>> (somewhere) and it's very large and has lots of very secure-seeming >>> passwords in it.

Re: [CentOS] duqu

2011-12-07 Thread Nicolas Thierry-Mieg
Lamar Owen wrote: > On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote: >> I happen to have a copy of an older brute-forcer dictionary here (somewhere) >> and it's very large and has lots of very secure-seeming passwords in it. > > I ran down the copy I have; here's an excerpt of one of th

Re: [CentOS] duqu

2011-12-06 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 03:49 AM, Always Learning piše: > > Op Woensdag, 7 december 03:45 +0100, Ljubomir Ljubojevic wrote: > >> Vreme: 12/07/2011 01:45 AM, Always Learning piše: >>> The first thing I did was to make a 20-odd character password for Root >>> with lowercase, uppercase and digits (using my

Re: [CentOS] duqu

2011-12-06 Thread Always Learning
Op Woensdag, 7 december 03:45 +0100, Ljubomir Ljubojevic wrote: > Vreme: 12/07/2011 01:45 AM, Always Learning piše: > > The first thing I did was to make a 20-odd character password for Root > > with lowercase, uppercase and digits (using my former address in > > Germany). > > I like using seria

Re: [CentOS] duqu

2011-12-06 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 01:45 AM, Always Learning piše: > The first thing I did was to make a 20-odd character password for Root > with lowercase, uppercase and digits (using my former address in > Germany). I like using serial numbers from Motherboards and other hardware. It's more random. -- Ljubo

Re: [CentOS] duqu

2011-12-06 Thread John Hinton
On 12/6/2011 7:12 PM, Les Mikesell wrote: > 2011/12/6 Fajar Priyanto: > I happen to have a copy of an older brute-forcer dictionary here > (somewhere) and it's very large and has lots of very secure-seeming > passwords in it. Why not don't allow root login from ssh? That's basic

Re: [CentOS] duqu

2011-12-06 Thread Always Learning
On Tue, 2011-12-06 at 17:06 -0800, James A. Peltier wrote: > | The first thing I did was to make a 20-odd character password for Root > | with lowercase, uppercase and digits (using my former address in > | Germany). > > Great! I'll do a little Google'ing and see if I can find out what that >

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
On Tue, Dec 6, 2011 at 7:06 PM, James A. Peltier wrote: > > > Admins are not the incompetent ones.  The users are!  Any decent admin is > going to ensure that there are the most layers and defensive systems in place > to ensure a level of security that doesn't require the *USERS* to be rocket >

Re: [CentOS] duqu

2011-12-06 Thread James A. Peltier
- Original Message - | On Tue, 2011-12-06 at 18:12 -0600, Les Mikesell wrote: | | > I'd expect it to be at least typical to firewall direct ssh access | > from the internet. | | A Linux newcomer, untrained and a self-learner, I made an abrupt | immersion into Linux on 1 June 2010. It was

Re: [CentOS] duqu

2011-12-06 Thread Always Learning
On Tue, 2011-12-06 at 18:12 -0600, Les Mikesell wrote: > I'd expect it to be at least typical to firewall direct ssh access > from the internet. A Linux newcomer, untrained and a self-learner, I made an abrupt immersion into Linux on 1 June 2010. It was a steep learning-curve. The first thing I

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
2011/12/6 Fajar Priyanto : > I happen to have a copy of an older brute-forcer dictionary here (somewhere) and it's very large and has lots of very secure-seeming passwords in it. >> >>> Why not don't allow root login from ssh? That's basic yet effective. >> >> This particular brute

Re: [CentOS] duqu

2011-12-06 Thread Fajar Priyanto
Dec 7, 2011 7:05 AM Lamar Owen 작성: > On Tuesday, December 06, 2011 05:31:58 PM Fajar Priyanto wrote: >> Dec 7, 2011 5:58 AM Lamar Owen 작성: >>> I happen to have a copy of an older brute-forcer dictionary here >>> (somewhere) and it's very large and has lots of very secure-seeming >>> password

Re: [CentOS] duqu

2011-12-06 Thread Lamar Owen
On Tuesday, December 06, 2011 05:31:58 PM Fajar Priyanto wrote: > Dec 7, 2011 5:58 AM Lamar Owen 작성: > >I happen to have a copy of an older brute-forcer dictionary here (somewhere) > >and it's very large and has lots of very secure-seeming passwords in it. > Why not don't allow root login from s

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
On Tue, Dec 6, 2011 at 3:45 PM, Johnny Hughes wrote: > Any luck on  the specific attack path yet?  The linked article suggests Centos up to 5.5 was vulnerable. >>> >>> We  dont have access to the actual machines that were broken into - so >>> pretty much everything is second hand info. >

Re: [CentOS] duqu

2011-12-06 Thread Lamar Owen
On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote: > I happen to have a copy of an older brute-forcer dictionary here (somewhere) > and it's very large and has lots of very secure-seeming passwords in it. I ran down the copy I have; here's an excerpt of one of the dictionaries:

Re: [CentOS] duqu

2011-12-06 Thread Fajar Priyanto
Dec 7, 2011 5:58 AM Lamar Owen 작성: > On Tuesday, December 06, 2011 04:45:04 PM Johnny Hughes wrote: >> If I had to guess, I would say that the attackers probably developed >> their code on CentOS, so they were looking for a CentOS machine to >> deploy their code on in the wild. That would be w

Re: [CentOS] duqu

2011-12-06 Thread Lamar Owen
On Tuesday, December 06, 2011 04:45:04 PM Johnny Hughes wrote: > If I had to guess, I would say that the attackers probably developed > their code on CentOS, so they were looking for a CentOS machine to > deploy their code on in the wild. That would be why I would say CentOS > was the OS used. I

Re: [CentOS] duqu

2011-12-06 Thread Johnny Hughes
On 12/06/2011 02:36 PM, Les Mikesell wrote: > On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh wrote: >> On 12/06/2011 08:09 PM, Les Mikesell wrote: >>> Any luck on the specific attack path yet? The linked article >>> suggests Centos up to 5.5 was vulnerable. >> >> We dont have access to the actu

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
On Tue, Dec 6, 2011 at 2:40 PM, wrote: > >> >>> But based on what we know and what we have been told and what we have >>> worked out ourselves as well, its almost certainly bruteforced ssh >>> passwords. >> >> So, coincidence that they were CentOS, and pre-5.6?   Did they have >> admins in common

Re: [CentOS] duqu

2011-12-06 Thread m . roth
Les Mikesell wrote: > On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh > wrote: >> On 12/06/2011 08:09 PM, Les Mikesell wrote: >>> Any luck on  the specific attack path yet?  The linked article >>> suggests Centos up to 5.5 was vulnerable. >> >> We  dont have access to the actual machines that were

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh wrote: > On 12/06/2011 08:09 PM, Les Mikesell wrote: >> Any luck on  the specific attack path yet?  The linked article >> suggests Centos up to 5.5 was vulnerable. > > We  dont have access to the actual machines that were broken into - so > pretty muc

Re: [CentOS] duqu

2011-12-06 Thread Karanbir Singh
On 12/06/2011 08:09 PM, Les Mikesell wrote: > Any luck on the specific attack path yet? The linked article > suggests Centos up to 5.5 was vulnerable. We dont have access to the actual machines that were broken into - so pretty much everything is second hand info. But based on what we know and

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
On Wed, Nov 30, 2011 at 12:40 PM, Johnny Hughes wrote: > On 11/30/2011 12:05 PM, m.r...@5-cent.us wrote: >> There's an article on slashdot about the Duqu team wiping all their >> intermediary c&c servers on 20 Oct. Interestingly, the report says that >> they were all (?) not only linux, but CentOS

Re: [CentOS] duqu

2011-12-04 Thread Rui Miguel Silva Seabra
On Wed, 30 Nov 2011 14:01:36 -0500 John Hinton wrote: > On 11/30/2011 1:55 PM, Benjamin Donnachie wrote: > > On 30 Nov 2011, at 18:51, Les Mikesell > > wrote: > > > >> Ssh is mostly about being able to log in. > > I've always adopted the policy of disabling root logins, making > > admins use a se

Re: [CentOS] duqu

2011-11-30 Thread Rob Kampen
Benjamin Donnachie wrote: On 30 Nov 2011, at 18:51, Les Mikesell wrote: Ssh is mostly about being able to log in. I've always adopted the policy of disabling root logins, making admins use a separate account with public/private key authentication and then requiring them to use su to

Re: [CentOS] duqu

2011-11-30 Thread Patrick Lists
On 30-11-11 20:01, John Hinton wrote: > On 11/30/2011 1:55 PM, Benjamin Donnachie wrote: >> On 30 Nov 2011, at 18:51, Les Mikesell wrote: >> >>> Ssh is mostly about being able to log in. >> I've always adopted the policy of disabling root logins, making admins >> use a separate account with publi

Re: [CentOS] duqu

2011-11-30 Thread Les Mikesell
On Wed, Nov 30, 2011 at 1:01 PM, John Hinton wrote: > On 11/30/2011 1:55 PM, Benjamin Donnachie wrote: > >>> Ssh is mostly about being able to log in. >> I've always adopted the policy of disabling root logins, making admins >> use a separate account with public/private key authentication and the

Re: [CentOS] duqu

2011-11-30 Thread Jim Perrin
On Wed, Nov 30, 2011 at 1:01 PM, John Hinton wrote: > > How would you automate daily logins from another server to do something > like rsync the entire /etc directory to a backup system? > Key restrictions in authorized_keys from="10.10.10.10" command="rsync -azv blah/blah/." ssh-key-info-here

Re: [CentOS] duqu

2011-11-30 Thread John Hinton
On 11/30/2011 1:55 PM, Benjamin Donnachie wrote: > On 30 Nov 2011, at 18:51, Les Mikesell wrote: > >> Ssh is mostly about being able to log in. > I've always adopted the policy of disabling root logins, making admins > use a separate account with public/private key authentication and then > requir

Re: [CentOS] duqu

2011-11-30 Thread Benjamin Donnachie
On 30 Nov 2011, at 18:51, Les Mikesell wrote: > Ssh is mostly about being able to log in. I've always adopted the policy of disabling root logins, making admins use a separate account with public/private key authentication and then requiring them to use su to elevate privileges. Has the advanta

Re: [CentOS] duqu

2011-11-30 Thread Les Mikesell
On Wed, Nov 30, 2011 at 12:42 PM, Rob Kampen wrote: > >> I've always wondered why something as complex as sshd doesn't do >> anything to protect you from the simplest form of attack - like >> rate-limiting failed attempts. >> >> > > Passwords?? Why? Because they are there and enabled by default..

Re: [CentOS] duqu

2011-11-30 Thread Rob Kampen
Les Mikesell wrote: On Wed, Nov 30, 2011 at 12:05 PM, wrote: Are your root passwords strong? I've always wondered why something as complex as sshd doesn't do anything to protect you from the simplest form of attack - like rate-limiting failed attempts. Passwords?? Why? Remote ro

Re: [CentOS] duqu

2011-11-30 Thread m . roth
Les Mikesell wrote: > On Wed, Nov 30, 2011 at 12:05 PM, wrote: >> >> Are your root passwords strong? > > I've always wondered why something as complex as sshd doesn't do > anything to protect you from the simplest form of attack - like > rate-limiting failed attempts. Well, it does take time to

Re: [CentOS] duqu

2011-11-30 Thread Johnny Hughes
On 11/30/2011 12:05 PM, m.r...@5-cent.us wrote: > There's an article on slashdot about the Duqu team wiping all their > intermediary c&c servers on 20 Oct. Interestingly, the report says that > they were all (?) not only linux, but CentOS. There's a suggestion of a > zero-day exploit in openssh-4.3

Re: [CentOS] duqu

2011-11-30 Thread Les Mikesell
On Wed, Nov 30, 2011 at 12:05 PM, wrote: > > Are your root passwords strong? I've always wondered why something as complex as sshd doesn't do anything to protect you from the simplest form of attack - like rate-limiting failed attempts. -- Les Mikesell lesmikes...@gmail.com ___

[CentOS] duqu

2011-11-30 Thread m . roth
There's an article on slashdot about the Duqu team wiping all their intermediary c&c servers on 20 Oct. Interestingly, the report says that they were all (?) not only linux, but CentOS. There's a suggestion of a zero-day exploit in openssh-4.3, but both the original article, and Kaspersky labs (who