Re: Long Exim break-in analysis

2010-12-26 Thread Marc Haber
On Tue, Dec 21, 2010 at 11:19:37PM +0100, Martin Zobel-Helas wrote: > # cat apt.conf.d/01remount > DPkg::Pre-Invoke {"if mount | awk '{print $3}' | grep -q '^/tmp$'; then > /bin/mount -o remount,exec /tmp; fi";}; > DPkg::Post-Invoke {"if mount | awk '{print $3}' | grep -q '^/tmp$'; then > /bin/mo

Re: Long Exim break-in analysis

2010-12-23 Thread Bastian Blank
On Thu, Dec 23, 2010 at 12:54:44PM +0100, Bernhard R. Link wrote: > * Bastian Blank [101222 11:30]: > > On Wed, Dec 22, 2010 at 10:18:50AM +0100, Bernhard R. Link wrote: > > > That said, having /tmp noexec,nosuid and /var nosuid will only make some > > > script-kiddies slower and the more people u

Re: Long Exim break-in analysis

2010-12-23 Thread Bernhard R. Link
* Bastian Blank [101222 11:30]: > On Wed, Dec 22, 2010 at 10:18:50AM +0100, Bernhard R. Link wrote: > > That said, having /tmp noexec,nosuid and /var nosuid will only make some > > script-kiddies slower and the more people use it the less it helps. > > It is a start. I'd not call it a start. It i

Re: Long Exim break-in analysis

2010-12-23 Thread Karl Goetz
On Tue, 21 Dec 2010 23:07:37 +0100 Vladislav Kurz wrote: > Hello all, > > first, I apologize for a long mail. Don't read if you don't like long > e-mails. But as Thorsten was already affected by exim exploit I > thought this might be interesting for all debian-exim users: > Very interesting, t

Re: Long Exim break-in analysis

2010-12-22 Thread Maximilian Wilhelm
Anno domini 2010 Izak Burger scripsit: Hi! Nice reports :) > But there is one bit that gets me. It does this: > mkdir -p /usr/include/mysql > echo dropbear >> /usr/include/mysql/mysql.hh1 > It never does anything with that file, and that file does not exist on > a real system, so its almost li

Re: Long Exim break-in analysis

2010-12-22 Thread Izak Burger
http://www.reddit.com/r/netsec/comments/en650/details_of_the_root_kit_that_go With the exception of replacing /etc/exim4/exim.conf, its pretty much exactly what happened to me :-) -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Cont

Re: Long Exim break-in analysis

2010-12-22 Thread Izak Burger
On Wed, Dec 22, 2010 at 2:06 PM, Bastian Blank wrote: > This looks like the rootkit I found somewhere in the internet: > | 137a3bbda16034d34307a9d686e6fdb45b3c8683  procps/free > | 5db25350dd15d3f1e63a4ff44fa85b72c21df72d  procps/kill > | eeab165a2cf06feb327fa996f35271c076e992bc  procps/pgrep > |

Re: Long Exim break-in analysis

2010-12-22 Thread Bastian Blank
On Wed, Dec 22, 2010 at 01:42:03PM +0200, Izak Burger wrote: > The usual process related things replaced: > free pgrep pmap skillsnice tload uptime w > kill pkill psslabtop sysctl topvmstat watch This looks like the rootkit I found somewhere in the internet: | 137a3bbda1603

Re: Long Exim break-in analysis

2010-12-22 Thread Izak Burger
This is a me too email. I found one overlooked machine that was compromised on 16th of December. The usual process related things replaced: free pgrep pmap skillsnice tload uptime w kill pkill psslabtop sysctl topvmstat watch All of these were chattr +ai, as if that was

Re: Long Exim break-in analysis

2010-12-22 Thread Bastian Blank
On Wed, Dec 22, 2010 at 10:18:50AM +0100, Bernhard R. Link wrote: > That said, having /tmp noexec,nosuid and /var nosuid will only make some > script-kiddies slower and the more people use it the less it helps. It is a start. > As long as you have things like /dev/shm world-writeable and not > mo

Re: Long Exim break-in analysis

2010-12-22 Thread Bernhard R. Link
* Vladislav Kurz [101221 23:09]: > As for point 2. it's a pity that dpkg is using /tmp and /var/lib/dpkg/ to run > scripts during installation and removal of packages. It would be nice if > whole /var could be mounted noexec. AFAIK dpkg does not run things in /tmp. The only thing running things i

Re: Long Exim break-in analysis

2010-12-21 Thread Martin Zobel-Helas
Hi, On Tue Dec 21, 2010 at 23:07:37 +0100, Vladislav Kurz wrote: > > Lessons learned: > 1. subscribe to DSA and run apt-get > 2. /var/spool, /var/tmp, /tmp and other places where unprivileged users can > write, should be mounted nosuid and even better noexec. It seems that this > could preven