Re: Found, a new rootkit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Gene Heskett wrote:

We've cut our bandwidth use in half by getting rid of that. We also checked the logs and added several dozen more addresses to /etc/hosts.deny,

That is fairly useless. IP addresses of attackers change as quickly at IP addressess of spammers, and they have so many it's like trying to fence off the porn sites of the world.

More important is to discover how the rogue gained entry and to close that loophole. How did the shell script get there? Whose account was used? Does .bash_history include useful clues about what was done? Did the attacker send email after gaining entry? If so, the recipent domain (eg Yahoo) may be interested.

Root's account, eh? Disallow password-based authentication for root. Ensure that only those who need it have shell accounts, and that those have good passwords. _I_ have incoming ssh land on my personal desktop, there there is only my password to worry about.


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux