Monitoring a file?
cpghost at cordula.ws
Sun Nov 23 15:54:22 PST 2003
> > I've finally found the culprit with a traditional method:
> > * md5 (binary from an uncompromised machine) on all files
> > * reinstalling from scratch (not buildworld, but really
> > installing from FTP)
> > * md5 again and diff.
> > Ugh... system clean again at last. :)
> You can't be sure. The attacker probably put an suid binary somewhere
> besides the normal system binaries, in which case it's still there and
> you may still be vulnerable. When you know you've been hacked, you
> need to wipe the disk and *really* reinstall from scratch. And be
> very careful about what you restore from backups, too.
I've inherited a set of 280 1U rack mount boxes, and I am in the
process of reinstalling from scratch every single server. Started with
infrastructure (DNS and firewalls), then working down to every server
with a fresh FTP install from the first recovered box. Yes, newfs
everything, and recompiling _all_ binaries from scratch. I even
reconfigured VLANs on the switches to avoid man-in-the-middle attacks
like tcp hijacking, while ftp installing, and locked the subnets
to these racks until everything's restored.
The only backups were databases in SQL and LDIF format and lots of
text data. No binaries and no compromised sources to recover from.
Of course, the data could've been hacked too, but that would take
more time to fix. I've only checked (and cleaned!) authorization
and authentication data so far.
Sometimes, small incidents trigger major reconfigurations. Good
that this happened before monday! ;)
Cordula's Web. http://www.cordula.ws/
More information about the freebsd-questions