Re: [CentOS] duqu

2011-12-07 Thread Nicolas Thierry-Mieg
Lamar Owen wrote: On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote: I happen to have a copy of an older brute-forcer dictionary here (somewhere) and it's very large and has lots of very secure-seeming passwords in it. I ran down the copy I have; here's an excerpt of one of the

Re: [CentOS] duqu

2011-12-07 Thread Johnny Hughes
On 12/07/2011 03:59 AM, Nicolas Thierry-Mieg wrote: Lamar Owen wrote: On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote: I happen to have a copy of an older brute-forcer dictionary here (somewhere) and it's very large and has lots of very secure-seeming passwords in it. I ran

Re: [CentOS] duqu

2011-12-07 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 11:12 AM, Johnny Hughes piše: On 12/07/2011 03:59 AM, Nicolas Thierry-Mieg wrote: Lamar Owen wrote: On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote: I happen to have a copy of an older brute-forcer dictionary here (somewhere) and it's very large and has lots of

Re: [CentOS] duqu

2011-12-07 Thread Adam Tauno Williams
On Wed, 2011-11-30 at 13:05 -0500, m.r...@5-cent.us wrote: There's an article on slashdot about the Duqu team wiping all their intermediary cc servers on 20 Oct. Interestingly, the report says that they were all (?) not only linux, but CentOS. There's a suggestion of a zero-day exploit in

Re: [CentOS] duqu

2011-12-07 Thread Adam Tauno Williams
On Tue, 2011-12-06 at 16:58 -0500, Lamar Owen wrote: On Tuesday, December 06, 2011 04:45:04 PM Johnny Hughes wrote: 1.) Keep up to date as much as possible (and a 24 hour window is quite short, honestly, compared to the timeframes this attack appears to have occupied); 2.) Keep up with your

Re: [CentOS] duqu

2011-12-07 Thread Johnny Hughes
On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote: Vreme: 12/07/2011 11:12 AM, Johnny Hughes piše: On 12/07/2011 03:59 AM, Nicolas Thierry-Mieg wrote: Lamar Owen wrote: On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote: I happen to have a copy of an older brute-forcer dictionary here

Re: [CentOS] duqu

2011-12-07 Thread Always Learning
On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote: There is also use of denyhosts and fail2ban. They allow only few attempts from one IP, and all users can share attacking IP's (default is every 30 min) so you are automatically protected from known attacking IP's. Any downside on this

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 05:48:24 AM Adam Tauno Williams wrote: *DISABLE* password authentication on public-facing [and preferably all] servers. Isn't that securing a server rule#1? Interestingly enough, there are vulnerability scanning tools out there that will flag the lack of a

Re: [CentOS] duqu

2011-12-07 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 12:53 PM, Always Learning piše: On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote: There is also use of denyhosts and fail2ban. They allow only few attempts from one IP, and all users can share attacking IP's (default is every 30 min) so you are automatically protected from

Re: [CentOS] duqu

2011-12-07 Thread Always Learning
On Wed, 2011-12-07 at 12:59 +0100, Ljubomir Ljubojevic wrote: Vreme: 12/07/2011 12:53 PM, Always Learning piše: On 12/07/2011 04:32 AM, Ljubomir Ljubojevic wrote: There is also use of denyhosts and fail2ban. They allow only few attempts from one IP, and all users can share attacking

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: [Changing the port #] is completely and utterly retarded. You have done *NOTHING* to secure SSH by doing this. You have instead made it only slightly, and I mean ever so slightly, more secure. A simple port scan of your

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 04:59:52 AM Nicolas Thierry-Mieg wrote: alphanumeric only isn't so secure-seeming is it? Is this for admins who log in with a cell phone instead of a real keyboard? ;-) seriously: I thought the consensus was that a secure password should contain at least one

Re: [CentOS] duqu

2011-12-07 Thread Always Learning
On Wed, 2011-12-07 at 07:07 -0500, Lamar Owen wrote: On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: A basic qualification to operate a computer would also be nice. Sad thing is, there is no such thing. Microsoft has proposed such... of course, the prerequisites would

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 05:32:00 AM Ljubomir Ljubojevic wrote: There is also use of denyhosts and fail2ban. They allow only few attempts from one IP, and all users can share attacking IP's (default is every 30 min) so you are automatically protected from known attacking IP's. Any

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 07:37:34 AM Always Learning wrote: ... The essential aspect of this suggestion is such a web site must be Linux non-denominational. Centos fans working with Ubuntu fans working with other flavours too including Red Hat et al. A genuine community Enterprise

Re: [CentOS] duqu

2011-12-07 Thread Stephen Harris
On Wed, Dec 07, 2011 at 07:07:33AM -0500, Lamar Owen wrote: On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: [Changing the port #] is completely and utterly retarded. You have done *NOTHING* to secure SSH by doing this. You have instead made it only slightly, and I mean

Re: [CentOS] duqu

2011-12-07 Thread Bowie Bailey
On 12/7/2011 7:07 AM, Lamar Owen wrote: On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: [Changing the port #] is completely and utterly retarded. You have done *NOTHING* to secure SSH by doing this. You have instead made it only slightly, and I mean ever so slightly, more

Re: [CentOS] duqu

2011-12-07 Thread Johnny Hughes
On 12/07/2011 08:17 AM, Stephen Harris wrote: On Wed, Dec 07, 2011 at 07:07:33AM -0500, Lamar Owen wrote: On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: [Changing the port #] is completely and utterly retarded. You have done *NOTHING* to secure SSH by doing this. You have

Re: [CentOS] duqu

2011-12-07 Thread Michael Simpson
On 7 December 2011 12:46, Lamar Owen lo...@pari.edu wrote: On Wednesday, December 07, 2011 05:32:00 AM Ljubomir Ljubojevic wrote: There is also use of denyhosts and fail2ban. They allow only few attempts from one IP, and all users can share attacking IP's (default is every 30 min) so you are

Re: [CentOS] duqu

2011-12-07 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 03:37 PM, Bowie Bailey piše: On 12/7/2011 7:07 AM, Lamar Owen wrote: On Tuesday, December 06, 2011 08:06:55 PM James A. Peltier wrote: [Changing the port #] is completely and utterly retarded. You have done *NOTHING* to secure SSH by doing this. You have instead made it

Re: [CentOS] duqu

2011-12-07 Thread Les Mikesell
On Wed, Dec 7, 2011 at 10:12 AM, Ljubomir Ljubojevic off...@plnet.rs wrote: Better yet. sshd could be upgraded to have dummy daemon on port 22. He will accept connections, ask for password but will not be able to resolve any usernames. Now THAT would be something. Or, it could simply

Re: [CentOS] duqu

2011-12-07 Thread Craig White
On Dec 7, 2011, at 4:49 AM, Johnny Hughes wrote: There is also use of denyhosts and fail2ban. They allow only few attempts from one IP, and all users can share attacking IP's (default is every 30 min) so you are automatically protected from known attacking IP's. Any downside on this

Re: [CentOS] duqu

2011-12-07 Thread Rui Miguel Silva Seabra
On Tue, 06 Dec 2011 15:45:04 -0600 Johnny Hughes joh...@centos.org wrote: On 12/06/2011 02:36 PM, Les Mikesell wrote: On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh mail-li...@karan.org wrote: On 12/06/2011 08:09 PM, Les Mikesell wrote: Any luck on the specific attack path yet? The

Re: [CentOS] duqu

2011-12-07 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 06:29 PM, Craig White piše: On Dec 7, 2011, at 4:49 AM, Johnny Hughes wrote: There is also use of denyhosts and fail2ban. They allow only few attempts from one IP, and all users can share attacking IP's (default is every 30 min) so you are automatically protected from known

Re: [CentOS] duqu

2011-12-07 Thread John R Pierce
On 12/07/11 8:12 AM, Ljubomir Ljubojevic wrote: Better yet. sshd could be upgraded to have dummy daemon on port 22. He will accept connections, ask for password but will not be able to resolve any usernames. Now THAT would be something. heh. connect port 22 to a honeypot running in a VM that

Re: [CentOS] duqu

2011-12-07 Thread Karanbir Singh
On 12/07/2011 06:59 PM, John R Pierce wrote: anyways, this is getting very far afield for a centos specific list, and should instead be discussed on a security list or forum somewhere. I've said this in the past as well - we have some super talent on this list when it comes to admin /

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 12:30:27 PM Rui Miguel Silva Seabra wrote: The fact that they immediately (first thing, actually) did was to upgrade OpenSSH does suggest that there is a Zero Day bug around. While at first blush that would appear to be so, it may be that the openssh was

Re: [CentOS] duqu

2011-12-07 Thread Lamar Owen
On Wednesday, December 07, 2011 10:44:10 AM Michael Simpson wrote: SELinux is great but didn't save Russell Coker from having his play machine owned with the vmsplice exploit. http://etbe.coker.com.au/2008/04/03/trust-and-play-machine/ http://www.coker.com.au/selinux/play.html In this

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
On Wed, Nov 30, 2011 at 12:40 PM, Johnny Hughes joh...@centos.org wrote: On 11/30/2011 12:05 PM, m.r...@5-cent.us wrote: There's an article on slashdot about the Duqu team wiping all their intermediary cc servers on 20 Oct. Interestingly, the report says that they were all (?) not only linux,

Re: [CentOS] duqu

2011-12-06 Thread Karanbir Singh
On 12/06/2011 08:09 PM, Les Mikesell wrote: Any luck on the specific attack path yet? The linked article suggests Centos up to 5.5 was vulnerable. We dont have access to the actual machines that were broken into - so pretty much everything is second hand info. But based on what we know and

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh mail-li...@karan.org wrote: On 12/06/2011 08:09 PM, Les Mikesell wrote: Any luck on  the specific attack path yet?  The linked article suggests Centos up to 5.5 was vulnerable. We  dont have access to the actual machines that were broken into -

Re: [CentOS] duqu

2011-12-06 Thread m . roth
Les Mikesell wrote: On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh mail-li...@karan.org wrote: On 12/06/2011 08:09 PM, Les Mikesell wrote: Any luck on  the specific attack path yet?  The linked article suggests Centos up to 5.5 was vulnerable. We  dont have access to the actual machines

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
On Tue, Dec 6, 2011 at 2:40 PM, m.r...@5-cent.us wrote: But based on what we know and what we have been told and what we have worked out ourselves as well, its almost certainly bruteforced ssh passwords. So, coincidence that they were CentOS, and pre-5.6?   Did they have admins in common?

Re: [CentOS] duqu

2011-12-06 Thread Johnny Hughes
On 12/06/2011 02:36 PM, Les Mikesell wrote: On Tue, Dec 6, 2011 at 2:18 PM, Karanbir Singh mail-li...@karan.org wrote: On 12/06/2011 08:09 PM, Les Mikesell wrote: Any luck on the specific attack path yet? The linked article suggests Centos up to 5.5 was vulnerable. We dont have access to

Re: [CentOS] duqu

2011-12-06 Thread Lamar Owen
On Tuesday, December 06, 2011 04:45:04 PM Johnny Hughes wrote: If I had to guess, I would say that the attackers probably developed their code on CentOS, so they were looking for a CentOS machine to deploy their code on in the wild. That would be why I would say CentOS was the OS used. I

Re: [CentOS] duqu

2011-12-06 Thread Fajar Priyanto
Dec 7, 2011 5:58 AM Lamar Owen lo...@pari.edu 작성: On Tuesday, December 06, 2011 04:45:04 PM Johnny Hughes wrote: If I had to guess, I would say that the attackers probably developed their code on CentOS, so they were looking for a CentOS machine to deploy their code on in the wild. That

Re: [CentOS] duqu

2011-12-06 Thread Lamar Owen
On Tuesday, December 06, 2011 04:58:42 PM Lamar Owen wrote: I happen to have a copy of an older brute-forcer dictionary here (somewhere) and it's very large and has lots of very secure-seeming passwords in it. I ran down the copy I have; here's an excerpt of one of the dictionaries:

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
On Tue, Dec 6, 2011 at 3:45 PM, Johnny Hughes joh...@centos.org wrote: Any luck on  the specific attack path yet?  The linked article suggests Centos up to 5.5 was vulnerable. We  dont have access to the actual machines that were broken into - so pretty much everything is second hand info.

Re: [CentOS] duqu

2011-12-06 Thread Lamar Owen
On Tuesday, December 06, 2011 05:31:58 PM Fajar Priyanto wrote: Dec 7, 2011 5:58 AM Lamar Owen lo...@pari.edu 작성: I happen to have a copy of an older brute-forcer dictionary here (somewhere) and it's very large and has lots of very secure-seeming passwords in it. Why not don't allow root

Re: [CentOS] duqu

2011-12-06 Thread Fajar Priyanto
Dec 7, 2011 7:05 AM Lamar Owen lo...@pari.edu 작성: On Tuesday, December 06, 2011 05:31:58 PM Fajar Priyanto wrote: Dec 7, 2011 5:58 AM Lamar Owen lo...@pari.edu 작성: I happen to have a copy of an older brute-forcer dictionary here (somewhere) and it's very large and has lots of very

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
2011/12/6 Fajar Priyanto fajar...@arinet.org: I happen to have a copy of an older brute-forcer dictionary here (somewhere) and it's very large and has lots of very secure-seeming passwords in it. Why not don't allow root login from ssh? That's basic yet effective. This particular

Re: [CentOS] duqu

2011-12-06 Thread Always Learning
On Tue, 2011-12-06 at 18:12 -0600, Les Mikesell wrote: I'd expect it to be at least typical to firewall direct ssh access from the internet. A Linux newcomer, untrained and a self-learner, I made an abrupt immersion into Linux on 1 June 2010. It was a steep learning-curve. The first thing I

Re: [CentOS] duqu

2011-12-06 Thread James A. Peltier
- Original Message - | On Tue, 2011-12-06 at 18:12 -0600, Les Mikesell wrote: | | I'd expect it to be at least typical to firewall direct ssh access | from the internet. | | A Linux newcomer, untrained and a self-learner, I made an abrupt | immersion into Linux on 1 June 2010. It was a

Re: [CentOS] duqu

2011-12-06 Thread Les Mikesell
On Tue, Dec 6, 2011 at 7:06 PM, James A. Peltier jpelt...@sfu.ca wrote: Admins are not the incompetent ones.  The users are!  Any decent admin is going to ensure that there are the most layers and defensive systems in place to ensure a level of security that doesn't require the *USERS* to

Re: [CentOS] duqu

2011-12-06 Thread Always Learning
On Tue, 2011-12-06 at 17:06 -0800, James A. Peltier wrote: | The first thing I did was to make a 20-odd character password for Root | with lowercase, uppercase and digits (using my former address in | Germany). Great! I'll do a little Google'ing and see if I can find out what that might

Re: [CentOS] duqu

2011-12-06 Thread John Hinton
On 12/6/2011 7:12 PM, Les Mikesell wrote: 2011/12/6 Fajar Priyantofajar...@arinet.org: I happen to have a copy of an older brute-forcer dictionary here (somewhere) and it's very large and has lots of very secure-seeming passwords in it. Why not don't allow root login from ssh? That's basic

Re: [CentOS] duqu

2011-12-06 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 01:45 AM, Always Learning piše: The first thing I did was to make a 20-odd character password for Root with lowercase, uppercase and digits (using my former address in Germany). I like using serial numbers from Motherboards and other hardware. It's more random. --

Re: [CentOS] duqu

2011-12-06 Thread Always Learning
Op Woensdag, 7 december 03:45 +0100, Ljubomir Ljubojevic wrote: Vreme: 12/07/2011 01:45 AM, Always Learning piše: The first thing I did was to make a 20-odd character password for Root with lowercase, uppercase and digits (using my former address in Germany). I like using serial

Re: [CentOS] duqu

2011-12-06 Thread Ljubomir Ljubojevic
Vreme: 12/07/2011 03:49 AM, Always Learning piše: Op Woensdag, 7 december 03:45 +0100, Ljubomir Ljubojevic wrote: Vreme: 12/07/2011 01:45 AM, Always Learning piše: The first thing I did was to make a 20-odd character password for Root with lowercase, uppercase and digits (using my former

Re: [CentOS] duqu

2011-12-04 Thread Rui Miguel Silva Seabra
On Wed, 30 Nov 2011 14:01:36 -0500 John Hinton webmas...@ew3d.com wrote: On 11/30/2011 1:55 PM, Benjamin Donnachie wrote: On 30 Nov 2011, at 18:51, Les Mikeselllesmikes...@gmail.com wrote: Ssh is mostly about being able to log in. I've always adopted the policy of disabling root

Re: [CentOS] duqu

2011-11-30 Thread Johnny Hughes
On 11/30/2011 12:05 PM, m.r...@5-cent.us wrote: There's an article on slashdot about the Duqu team wiping all their intermediary cc servers on 20 Oct. Interestingly, the report says that they were all (?) not only linux, but CentOS. There's a suggestion of a zero-day exploit in openssh-4.3,

Re: [CentOS] duqu

2011-11-30 Thread m . roth
Les Mikesell wrote: On Wed, Nov 30, 2011 at 12:05 PM, m.r...@5-cent.us wrote: Are your root passwords strong? I've always wondered why something as complex as sshd doesn't do anything to protect you from the simplest form of attack - like rate-limiting failed attempts. Well, it does take

Re: [CentOS] duqu

2011-11-30 Thread Rob Kampen
Les Mikesell wrote: On Wed, Nov 30, 2011 at 12:05 PM, m.r...@5-cent.us wrote: Are your root passwords strong? I've always wondered why something as complex as sshd doesn't do anything to protect you from the simplest form of attack - like rate-limiting failed attempts.

Re: [CentOS] duqu

2011-11-30 Thread Les Mikesell
On Wed, Nov 30, 2011 at 12:42 PM, Rob Kampen rkam...@kampensonline.com wrote: I've always wondered why something as complex as sshd doesn't do anything to protect you from the simplest form of attack - like rate-limiting failed attempts. Passwords?? Why? Because they are there and enabled

Re: [CentOS] duqu

2011-11-30 Thread Benjamin Donnachie
On 30 Nov 2011, at 18:51, Les Mikesell lesmikes...@gmail.com wrote: Ssh is mostly about being able to log in. I've always adopted the policy of disabling root logins, making admins use a separate account with public/private key authentication and then requiring them to use su to elevate

Re: [CentOS] duqu

2011-11-30 Thread John Hinton
On 11/30/2011 1:55 PM, Benjamin Donnachie wrote: On 30 Nov 2011, at 18:51, Les Mikeselllesmikes...@gmail.com wrote: Ssh is mostly about being able to log in. I've always adopted the policy of disabling root logins, making admins use a separate account with public/private key authentication

Re: [CentOS] duqu

2011-11-30 Thread Jim Perrin
On Wed, Nov 30, 2011 at 1:01 PM, John Hinton webmas...@ew3d.com wrote: How would you automate daily logins from another server to do something like rsync the entire /etc directory to a backup system? Key restrictions in authorized_keys from=10.10.10.10 command=rsync -azv blah/blah/.

Re: [CentOS] duqu

2011-11-30 Thread Les Mikesell
On Wed, Nov 30, 2011 at 1:01 PM, John Hinton webmas...@ew3d.com wrote: On 11/30/2011 1:55 PM, Benjamin Donnachie wrote: Ssh is mostly about being able to log in. I've always adopted the policy of disabling root logins, making admins use a separate account with public/private key

Re: [CentOS] duqu

2011-11-30 Thread Patrick Lists
On 30-11-11 20:01, John Hinton wrote: On 11/30/2011 1:55 PM, Benjamin Donnachie wrote: On 30 Nov 2011, at 18:51, Les Mikeselllesmikes...@gmail.com wrote: Ssh is mostly about being able to log in. I've always adopted the policy of disabling root logins, making admins use a separate account

Re: [CentOS] duqu

2011-11-30 Thread Rob Kampen
Benjamin Donnachie wrote: On 30 Nov 2011, at 18:51, Les Mikesell lesmikes...@gmail.com wrote: Ssh is mostly about being able to log in. I've always adopted the policy of disabling root logins, making admins use a separate account with public/private key authentication and then