rkhunter / chkrootkit

2004-11-05 Thread Mark-Walter
Hello, it now it was a couple of days ago but I've to concern another time to in this case a compromised woody system. chkrootkit found nothing but rkhunter found quite a lot: /bin/login /bin/su /usr/bin/locate /usr/sbin/useradd /usr/sbin/usermod /usr/sbin/vip All these binaries have been alert

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Jan Minar
On Fri, Nov 05, 2004 at 03:10:00PM +, Baruch Even wrote: > On Fri, 2004-11-05 at 12:49, Jan Minar wrote: > > --- iptables-1.2.6a.ORIG/iptables.8 Fri Nov 5 12:28:43 2004 > > +++ iptables-1.2.6a-local.0/iptables.8 Fri Nov 5 12:47:14 2004 > > @@ -521,7 +521,12 @@ > > supporting this featur

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread George Georgalis
On Fri, Nov 05, 2004 at 05:57:18PM +, Baruch Even wrote: >On Fri, 2004-11-05 at 17:13, George Georgalis wrote: >> On Fri, Nov 05, 2004 at 03:04:34PM +, Baruch Even wrote: >> >> >ESTABLISHED,RELATED >> >NEW >> >INVALID >> >pick two to cover the spectrum of attacks. >> >> Why not all three

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Jan Minar
On Fri, Nov 05, 2004 at 03:04:34PM +, Baruch Even wrote: > On Fri, 2004-11-05 at 14:27, martin f krafft wrote: > You have three categories into which all sessions go: > ESTABLISHED,RELATED > NEW > INVALID > pick two to cover the spectrum of attacks. > > If you don't check for NEW, a SYN packet

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Baruch Even
On Fri, 2004-11-05 at 17:13, George Georgalis wrote: > On Fri, Nov 05, 2004 at 03:04:34PM +, Baruch Even wrote: > > >ESTABLISHED,RELATED > >NEW > >INVALID > >pick two to cover the spectrum of attacks. > > Why not all three in this order... > > INVALID -j REJECT > ESTABLISHED,RELATED -j ACCE

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread George Georgalis
On Fri, Nov 05, 2004 at 03:04:34PM +, Baruch Even wrote: >ESTABLISHED,RELATED >NEW >INVALID >pick two to cover the spectrum of attacks. Why not all three in this order... INVALID -j REJECT ESTABLISHED,RELATED -j ACCEPT NEW -j ACCEPT (if allowed) I'm thinking PREROUTING is the best table (c

restricting to local access with pam_access

2004-11-05 Thread martin f krafft
I want to restrict access to a set of machines to all users to local access only. Effectively, I only want to allow login and kdm access, unless the user is a meember of group 'remote', in which case s/he should also be able to use ssh, cron, and other PAM-using software. I think this has to be do

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Baruch Even
On Fri, 2004-11-05 at 12:49, Jan Minar wrote: > On Fri, Nov 05, 2004 at 11:29:21AM +, Baruch Even wrote: > > On Thu, 2004-11-04 at 18:41, martin f krafft wrote: > > > What's the point of matching state NEW *and* SYN packets? Just SYN > > > packets should suffice. > > > > This comes from the fa

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Baruch Even
On Fri, 2004-11-05 at 13:06, Stefan Fritsch wrote: > Hi! > > On Friday 05 November 2004 12:27, Baruch Even wrote: > > > iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT > > > iptables -A INPUT -m state --state NEW -p tcp --tcp-flags ALL SYN -j ACCEPT > > > > Please dont do that! >

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Baruch Even
On Fri, 2004-11-05 at 14:27, martin f krafft wrote: > also sprach Baruch Even <[EMAIL PROTECTED]> [2004.11.05.1229 +0100]: > > This comes from the fact that the NEW state of Netfilter only > > means that this is the first time this connection is seen by the > > firewall. What you really want is the

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Baruch Even
On Fri, 2004-11-05 at 12:03, Florian Weimer wrote: > * Jan Minar: > > >>Is this a serious problem? > > > > Maybe. It is a very serious bug. > > Actually, it's a feature because some TCP extensions use SYN+FIN ("TCP > for Transactions" or something like that). TTCP is a dead proposal, it bri

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread martin f krafft
Please do not CC me on list replies. It's in the header, it's in my signature, it's in the list policy. also sprach Baruch Even <[EMAIL PROTECTED]> [2004.11.05.1229 +0100]: > This comes from the fact that the NEW state of Netfilter only > means that this is the first time this connection is seen b

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Stefan Fritsch
Hi! On Friday 05 November 2004 12:27, Baruch Even wrote: > > iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT > > iptables -A INPUT -m state --state NEW -p tcp --tcp-flags ALL SYN -j ACCEPT > > Please dont do that! > You can use SYN,ACK,FIN,RST SYN to check for illegal flags. Sho

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Jan Minar
On Fri, Nov 05, 2004 at 11:29:21AM +, Baruch Even wrote: > On Thu, 2004-11-04 at 18:41, martin f krafft wrote: > > also sprach Luis Pérez Meliá <[EMAIL PROTECTED]> [2004.11.04.1848 +0100]: > > > iptables -A INPUT -m state --state NEW -p tcp --tcp-flags > > > ALL SYN -j ACCEPT >

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Florian Weimer
* Jan Minar: >>Is this a serious problem? > > Maybe. It is a very serious bug. Actually, it's a feature because some TCP extensions use SYN+FIN ("TCP for Transactions" or something like that). The real, nasty bug was in stacks that accepted SYN+RST as a regular SYN, easily passing through t

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Baruch Even
On Thu, 2004-11-04 at 18:41, martin f krafft wrote: > also sprach Luis Pérez Meliá <[EMAIL PROTECTED]> [2004.11.04.1848 +0100]: > > iptables -A INPUT -m state --state NEW -p tcp --tcp-flags > > ALL SYN -j ACCEPT > > What's the point of matching state NEW *and* SYN packets? Just SYN

Re: TCP SYN packets which have the FIN flag set.

2004-11-05 Thread Baruch Even
On Thu, 2004-11-04 at 17:48, Luis Pérez Meliá wrote: > I'm using iptables. > > In my rules I have this: > . > . > . > iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT > iptables -A INPUT -m state --state NEW -p tcp --tcp-flags ALL SYN -j ACCE