[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Re: [cobalt-security] RaQ3i are still vulnerable AFTER BIND update..



Thanks for your support Michael, I'm only 26 but in the last 48 hours most of my hair has either fallen out or has gone grey, but I can live with that as long as my service provider manages to get this restore done. It sounds as if they're floundering a bit at the moment while i'm taking lots of flak from all our customers.. To make things worse I'm in Scotland and my servers are in London, and I'm meant to be flying off on holiday tomorrow :( 

what you say about named "modify /etc/named.conf to run the named service as user named, group named" How do I go about doing this properly as I think they did exploit my DNS server?

and I wish I knew about the Swiss Army Kit before this happened because I can't get anything on there now.. I talked with a friend who is a lot more linux savvy than I, he hunched that there may be a way to use the rootkit against itself to change things.. probably doubtful though. Cobalt told me that Professional services could likely clean things up but I had to make a decision fast and get the guys to start rebuilding another RaQ3i, install all patches and other security measures change the IP address to mine then copy back over all my data and config files. Even this fills me with dread though...

Any more of your thoughts are very welcome..

Paul



> Michael Stauber <cobalt@xxxxxxxxxxxxxx> cobalt-security@xxxxxxxxxxxxxxx Re: [cobalt-security] RaQ3i are still vulnerable AFTER BIND update..Reply-To: cobalt-security@xxxxxxxxxxxxxxx
>Date: Fri, 17 Aug 2001 15:21:47 +0200
>
>Hi Paul,
>
>> One of my Cobalt RaQ3i server was completely shafted on Wednesday night and
>> after a few hours i'm 100% sure its the t0rn rootkit and probably:
>>
>> The Lion worm is similar to the Ramen worm.
>
>I've done security audits for several ISP's and have seen many infected 
>Cobalt boxes this year. I was able to manually clean out and to secure about 
>a dozend of boxes infected with t0rn, Lion and Adore, but in most cases an OS 
>restore was the only feasible way to go. 
>
>Why? That depends on the degree and duration of the infection. The longer the 
>bad guys have been into your box, the more likely they fortified their 
>position and the more nasty surprises are hidden somewhere. 
>
>Aditionally an OS restore is more economic, as it'll take you out of business 
>for 1-3 hours. Snooping around on the system and cleaning it out manually 
>usually takes 4-8 hours and there's still no guarantee that it's really clean 
>afterwards.
>
>To regain the trust and to be sure that nobody else "owns" the box you have 
>to wipe it clean with the OS restore. Then you install all the patches and 
>install additional security measures. Like those that RAQport.com and others 
>offer.
>
>If you haven't done so already you might want to run "chkrootkit" from 
>http://www.chkrootkit.org/ on your machine. It detects about 20 rootkits and 
>their variants.
>
>> The box certainly shows all of those signs.. it has about 60 sites on it
>> and is a DNS server. It was definately patched with BIND Update 4.0.1
>> RaQ3-All-Security-4.0.2-9353.pkg.
>
>With great confidence I can say that none of the 80 Cobalt's I've patched, 
>secured and worked on the last half year has been compromised by Li0n, Ramen 
>or other worms. So unless proven otherwise I still tend to think that the 
>Bind-8.2.3 which comes with RaQ3-All-Security-4.0.2-9353.pkg and 
>RaQ4-All-Security-1.0.2-9353.pkg is safe. Then again, I always modified 
>/etc/named.conf to run the named service as user named, group named. I still 
>think that it's hillarious (if not maliciously dumb) that SUN/Cobalt doesn't 
>implement this crucial and very effective security measure instead of running 
>bind as root:root.
>
>> I am in the process of rebuilding the machine but I would still like to be
>> able to check for sure if this hacker/script really has wiped out
>> everything in my /home directory... i can't do much of anything seeing as
>> its replaced my ls, ps, top, etc. and (maybe not a feature of the toolkit)
>> has made my filesystem Read-only. 
>
>Do you know the "Swiss Army Knife of embedded Linux"? 
>
>See: http://busybox.lineo.com/
>
>Here is a blurb from their website: "BusyBox combines tiny versions of many 
>common UNIX utilities into a single small executable. It provides minimalist 
>replacements for most of the utilities you usually find in fileutils, 
>shellutils, findutils, textutils, grep, gzip, tar, etc. BusyBox provides a 
>fairly complete POSIX environment for any small or embedded system. The 
>utilities in BusyBox generally have fewer options than their full featured 
>GNU cousins; however, the options that are included provide the expected 
>functionality and behave very much like their GNU counterparts."
>
>So after compiling busybox you got untainted system tools like ps, ls, top 
>and thelike. It's a great tool to diagnose hacked boxes, especially when 
>you're not sure which onboard utilities you can still trust and which not.
>
>> Does anyone know this bugger inside out
>> and at least help find a way to get the filesystem writeable and maybe then
>> I can start to remove obvious entries from scripts like inetd.conf an
>> rc.sysinit and replace good copies of files.
>
>The problem is that someone most likely inserted a kernel module at runtime 
>which now protects parts of the filesystems and makes them read only for user 
>root. When you look through your startscripts you might be able to find where 
>this LKM is loaded, but that most likely won't help you as you can't edit the 
>file in question.
>
>The only worthwile thing you can do is to remove the harddisk from the RaQ 
>and to put it as slave into another Linux machine. Then mount the partitions 
>from the "infected" hardrive and either repair the files, or pull off the 
>data which you want to recover for re-usage after an OS restore.
>
>Anyhow ... best of luck with this and let me know if you have any additional 
>questions.
>
>-- 
>
>With best regards,
>
>Michael Stauber
>SOLARSPEED.NET
>_______________________________________________
>cobalt-security mailing list
>cobalt-security@xxxxxxxxxxxxxxx
>http://list.cobalt.com/mailman/listinfo/cobalt-security




------------------------------------------------------------
Email account furnished courtesy of AntiOnline - http://www.AntiOnline.com
AntiOnline - The Internet's Information Security Super Center!