Re: Hacked - FreeBSD 7.1-Release

2010-01-02 Thread Ian Smith
On Thu, 31 Dec 2009, Jeremy Chadwick wrote: > On Thu, Dec 31, 2009 at 04:16:07AM +1100, Ian Smith wrote: > > On Tue, 29 Dec 2009, David Wolfskill wrote: > > > On Tue, Dec 29, 2009 at 03:20:37AM -0800, Jeremy Chadwick wrote: > > > > ... > > > > I've written my own script to do all of this.

Re: Hacked - FreeBSD 7.1-Release

2009-12-31 Thread Jeremy Chadwick
On Thu, Dec 31, 2009 at 04:16:07AM +1100, Ian Smith wrote: > On Tue, 29 Dec 2009, David Wolfskill wrote: > > On Tue, Dec 29, 2009 at 03:20:37AM -0800, Jeremy Chadwick wrote: > > > ... > > > I've written my own script to do all of this. It parses periodic > > > security mails (on a daily basis)

Re: Hacked - FreeBSD 7.1-Release

2009-12-30 Thread Ian Smith
On Tue, 29 Dec 2009, David Wolfskill wrote: > On Tue, Dec 29, 2009 at 03:20:37AM -0800, Jeremy Chadwick wrote: > > ... > > I've written my own script to do all of this. It parses periodic > > security mails (on a daily basis), and does WHOIS lookups + parses the > > results to tell me what ne

Re: Hacked - FreeBSD 7.1-Release

2009-12-30 Thread Edwin Groothuis
On Tue, Dec 29, 2009 at 08:10:42AM -0800, Brian W. wrote: > On 12/29/2009 3:45 AM, Edwin Groothuis wrote: > >mpt to pass a Turing test or something. > > > >On all systems which need to be accessible from the public Internet: > >Run sshd on port 22 and port 8022. Block incoming traffic on port >

Re: Hacked - FreeBSD 7.1-Release

2009-12-30 Thread Stephane Rochoy
On Tue, Dec 29, 2009 at 08:46:57PM +0100, Oliver Fromme wrote: > Brian W. wrote: [...] > That's probably because OpenBSD doesn't have mac_portacl(4). ;-) [...] Arf, but pf allow to regulate traffic according to the user that own the socket, e.g., pass from any to any port www user www :p -- Ste

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread Jeremy Chadwick
On Tue, Dec 29, 2009 at 02:30:11PM -0500, Lowell Gilbert wrote: > > On Mon, Dec 28, 2009 at 10:44:41AM -0500, Andresen, Jason R. wrote: > >> The point is, if your machine is on the internet, then bots are > >> going to try password attacks on any open port they can find. It's > >> just the sad fac

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread Oliver Fromme
Brian W. wrote: > On 12/29/2009 3:45 AM, Edwin Groothuis wrote: > > On all systems which need to be accessible from the public Internet: > > Run sshd on port 22 and port 8022. Block incoming traffic on port > > 22 on your firewall. > > > > Everybody coming from the outside world needs to kn

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread Lowell Gilbert
Edwin Groothuis writes: > On Mon, Dec 28, 2009 at 10:44:41AM -0500, Andresen, Jason R. wrote: >> The point is, if your machine is on the internet, then bots are >> going to try password attacks on any open port they can find. It's >> just the sad fact of life on the current internet. Unfortunat

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread jhell
Tuesday, December 29, 2009, 6:20:37 AM, you wrote: > On Mon, Dec 28, 2009 at 05:50:23PM -0600, Adam Vande More wrote: >> On Mon, Dec 28, 2009 at 4:59 PM, Chris H wrote: >> >> > >> > My point here was that by increasing the verbosity, you will more easily be >> > able >> > to grep against login

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread David Wolfskill
On Tue, Dec 29, 2009 at 03:20:37AM -0800, Jeremy Chadwick wrote: > ... > I've written my own script to do all of this. It parses periodic > security mails (on a daily basis), and does WHOIS lookups + parses the > results to tell me what netblocks/CIDRs I should consider blocking. For > example, f

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread Chris BeHanna
On Dec 29, 2009, at 10:10 , Brian W. wrote: > On 12/29/2009 3:45 AM, Edwin Groothuis wrote: >> mpt to pass a Turing test or something. >> On all systems which need to be accessible from the public Internet: >> Run sshd on port 22 and port 8022. Block incoming traffic on port >> 22 on your firewa

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread Brian W.
On 12/29/2009 3:45 AM, Edwin Groothuis wrote: mpt to pass a Turing test or something. On all systems which need to be accessible from the public Internet: Run sshd on port 22 and port 8022. Block incoming traffic on port 22 on your firewall. Everybody coming from the outside world needs to

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread Tuomo Latto
Adam Vande More wrote: > I use security/denyhosts for this, very simple to setup like 5 minutes if > you're a fast reader. There are other options as well that offer similar > functionality. Like security/bruteblock -- Tuomo ... The way to a man's heart is through the left ventricle

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread Ronald Klop
On Tue, 29 Dec 2009 12:45:36 +0100, Edwin Groothuis wrote: On Mon, Dec 28, 2009 at 10:44:41AM -0500, Andresen, Jason R. wrote: The point is, if your machine is on the internet, then bots are going to try password attacks on any open port they can find. It's just the sad fact of life on the

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread Edwin Groothuis
On Mon, Dec 28, 2009 at 10:44:41AM -0500, Andresen, Jason R. wrote: > The point is, if your machine is on the internet, then bots are > going to try password attacks on any open port they can find. It's > just the sad fact of life on the current internet. Unfortunately, > this activity will also

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread Jeremy Chadwick
On Mon, Dec 28, 2009 at 05:50:23PM -0600, Adam Vande More wrote: > On Mon, Dec 28, 2009 at 4:59 PM, Chris H wrote: > > > > > My point here was that by increasing the verbosity, you will more easily be > > able > > to grep against login /failures/, and more easily discover dictionary/ > > brute-fo

Re: Hacked - FreeBSD 7.1-Release

2009-12-29 Thread Jordi Espasa Clofent
# pfctl -sr | grep ssh_brutes block drop quick from to any pass quick on em1 inet proto tcp from any to xxx.xxx.xxx.0/23 port = ssh flags S/SA keep state (source-track rule, max-src-conn 20, max-src-conn-rate 3/12, overload flush global, src.track 12) pass quick on em0 inet proto tcp from any

Re: Hacked - FreeBSD 7.1-Release

2009-12-28 Thread Adam Vande More
On Mon, Dec 28, 2009 at 4:59 PM, Chris H wrote: > > My point here was that by increasing the verbosity, you will more easily be > able > to grep against login /failures/, and more easily discover dictionary/ > brute-force > attacks. It's certainly made my job easier, and hasn't required any > mod

RE: Hacked - FreeBSD 7.1-Release

2009-12-28 Thread Chris H
On Mon, December 28, 2009 7:44 am, Andresen, Jason R. wrote: >> From: Chris H >> >> >> On Tue, December 22, 2009 8:35 am, Andresen, Jason R. wrote: >> >>> Squirrel wrote: >>> >>> most likely could be some kind of remote code execution or SQLi >> executed in the context of some php scripts

RE: Hacked - FreeBSD 7.1-Release

2009-12-28 Thread Andresen, Jason R.
>From: Chris H > >On Tue, December 22, 2009 8:35 am, Andresen, Jason R. wrote: >> Squirrel wrote: >> >>> most likely could be some kind of remote code execution or SQLi >executed in >>> the context of some php scripts, you should audit php code of your >web >>> interface and of the websites you hos

Re: Hacked - FreeBSD 7.1-Release

2009-12-25 Thread Dan Langille
Chris H wrote: On Tue, December 22, 2009 8:35 am, Andresen, Jason R. wrote: Squirrel wrote: most likely could be some kind of remote code execution or SQLi executed in the context of some php scripts, you should audit php code of your web interface and of the websites you host. also consider t

RE: Hacked - FreeBSD 7.1-Release

2009-12-24 Thread Chris H
On Tue, December 22, 2009 8:35 am, Andresen, Jason R. wrote: > Squirrel wrote: > >> most likely could be some kind of remote code execution or SQLi executed in >> the context of some php scripts, you should audit php code of your web >> interface and of the websites you host. also consider the stre

RE: Hacked - FreeBSD 7.1-Release

2009-12-22 Thread Sean Hulbert
praeparet bellum!!!   Epitoma Rei Militaris -Original Message- From: owner-freebsd-sta...@freebsd.org [mailto:owner-freebsd-sta...@freebsd.org] On Behalf Of Andresen, Jason R. Sent: Tuesday, December 22, 2009 8:36 AM To: FreeBSD-STABLE Mailing List Subject: RE: Hacked - FreeBSD 7

RE: Hacked - FreeBSD 7.1-Release

2009-12-22 Thread Andresen, Jason R.
Squirrel wrote: >most likely could be some kind of remote code execution or SQLi executed >in the context of some php scripts, you should audit php code of your >web interface and of the websites you host. >also consider the strenght of your passwords, lots of login attempts to >ssh/ftp may mean a

Re: Hacked - FreeBSD 7.1-Release

2009-12-14 Thread kama
gt; > Thanks for info. > > > > > > -Original message- > > From: Matthew Seaman m.sea...@infracaninophile.co.uk > > Date: Thu, 10 Dec 2009 02:24:34 -0600 > > To: squir...@isot.com > > Subject: Re: Hacked - FreeBSD 7.1-Release > > > &

Re: Hacked - FreeBSD 7.1-Release

2009-12-10 Thread Ganbold
Don't forget to check vulnerable php codes for SQL injection, LFI/RFI, problematic file uploads etc. Ganbold > Thanks for info. > > > -Original message- > From: Matthew Seaman m.sea...@infracaninophile.co.uk > Date: Thu, 10 Dec 2009 02:24:34 -0600 > To: sq

Re: Hacked - FreeBSD 7.1-Release

2009-12-10 Thread Squirrel
- From: Matthew Seaman m.sea...@infracaninophile.co.uk Date: Thu, 10 Dec 2009 02:24:34 -0600 To: squir...@isot.com Subject: Re: Hacked - FreeBSD 7.1-Release > Squirrel wrote: > > I've just finished the rtld patch. Now in process of regenerating > > all the keys and certs. Nex

Re: Hacked - FreeBSD 7.1-Release

2009-12-10 Thread Markiyan Kushnir
As long as you have to re-install everything from scratch, you can consider installing 8.0 and having your services jailed. The new jail is announced to be much improved. Markiyan. Paul Procacci wrote: >> But far as rtld vulnerability, doesn't it require at least a local user account? No, i

Re: Hacked - FreeBSD 7.1-Release

2009-12-10 Thread Paul Procacci
>> But far as rtld vulnerability, doesn't it require at least a local user account? No, it requires a script and a kiddie. ;) You'd expect your "index.php" (or similar) files would require a ftp/ssh/telnet connection, but useful "kids" have useful resources 'n which these things are not always

Re: Hacked - FreeBSD 7.1-Release

2009-12-10 Thread Jeremy Chadwick
On Wed, Dec 09, 2009 at 06:40:17PM -0600, Squirrel wrote: > My server was hacked, and the hacker was nice enough to not cause damage > except changing index.php of couple of my websites. The index.php had the > following info: > > "Hacked By Top > First Warning That's Bug From Your Servers > Ne

Re: Hacked - FreeBSD 7.1-Release

2009-12-10 Thread ocean
Squirrel wrote: My server was hacked, and the hacker was nice enough to not cause damage except changing index.php of couple of my websites. The index.php had the following info: "Hacked By Top First Warning That's Bug From Your Servers Next Time You Must Be Careful And Fixed Your Site Before C

Re: Hacked - FreeBSD 7.1-Release

2009-12-09 Thread Matthew Seaman
Squirrel wrote: I've just finished the rtld patch. Now in process of regenerating all the keys and certs. Next will look into php. But far as rtld vulnerability, doesn't it require at least a local user account? Looking at all the authentication, there wasn't any authenticated session during t

Re: Hacked - FreeBSD 7.1-Release

2009-12-09 Thread Squirrel
Taking your advice and checking all ports for problems. Thanks. -Original message- From: Xin LI delp...@delphij.net Date: Wed, 09 Dec 2009 20:18:13 -0600 To: squir...@isot.com Subject: Re: Hacked - FreeBSD 7.1-Release > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > &

Re: Hacked - FreeBSD 7.1-Release

2009-12-09 Thread Squirrel
the time frame. So I'm leaning more towards php 5.2.9, and checking all my ports. Thanks for info. -Original message- From: Chuck Swiger cswi...@mac.com Date: Wed, 09 Dec 2009 20:12:08 -0600 To: squir...@isot.com Subject: Re: Hacked - FreeBSD 7.1-Release > On Dec 9, 200

Re: Hacked - FreeBSD 7.1-Release

2009-12-09 Thread Xin LI
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Squirrel wrote: > My server was hacked, and the hacker was nice enough to not cause damage > except changing index.php of couple of my websites. The index.php had the > following info: > > "Hacked By Top > First Warning That's Bug From Your Servers

Re: Hacked - FreeBSD 7.1-Release

2009-12-09 Thread Chuck Swiger
On Dec 9, 2009, at 4:40 PM, Squirrel wrote: > My server was hacked, and the hacker was nice enough to not cause damage > except changing index.php of couple of my websites. The index.php had the > following info: > > "Hacked By Top > First Warning That's Bug From Your Servers > Next Time You Mu