Re: rootkit?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 12 Dec 2005 14:57:28 -0500
Chasecreek Systemhouse <chasecreek.systemhouse@xxxxxxxxx> opined:

> On 12/11/05, Craig White <craigwhite@xxxxxxxxxxx> wrote:
> 
> > > Whats the general removal procedure for this, and better yet, how
> > > did they get in?
> > ----
> > it would seem that ssh, root allowed to login via password would be
> > the magic combination of bad judgement...it's been so thoroughly
> > discussed on this list as of late.
> 
> About three months ago I reported a box I admin'ed was accessed thru
> DDoS on the ssh access port -- the sshd was hit 90,000 times a hour
> and the attacker gained access.  They didn't get to do much as the box
> had no compiler, no Perl, and was locked up by SELinux.  I made the
> report to both openssh and to the RedHat ssh developers.  I was
> running FC4 with the then current patches up-to-date.
> 
At the risk of being redundant, running the swatch daemon can add these
nitwits to the firewall on the first attempt.
-- 
Our DNSRBL - 
           Eliminate Spam: http://www.TQMcube.com/spam_trap.php
          Multi-RBL Check: http://www.TQMcube.com/rblcheck.php
            Zombie Graphs: http://www.TQMcube.com/zombies.php
              GeoGraphics: http://www.TQMcube.com/origins.php


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux