-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The following is *NOT* legal advice.

Mitchell Brown wrote:
> Here's the scoop:
> 
> Shaw calls me, tells me that my domain (untitled1.ca

Are you sure?

> <http://untitled1.ca>) has been port scanning big companies (their
> clients) for the last month - if it doesn't stop, they'll press charges.
> Whoaaa! My hosting providor says that he's 99% sure its not their
> server, as they have up to date PHP and MySQL and run rootkit checks
> every night. Good. So that leaves two possibilities
> 
>     * Some rogue computer has a *.untitled1.ca dns entry stamped all
>       over their IP

Which actually means nothing.  Start with the IP owner.  Really, they
should be going by the IP.  Somebody owns that IP and is ultimately
responsible for its security and behavior (and also its reverse DNS).
The crap  will flow downhill from there.

Likely the guy on the phone is clueless and likes to scare people. The
law is not a fast process.  You do not use lawyers if you want something
done quickly.   Always ask for identification (name, rep number,
department, supervisor are not bad things to ask for) and record the
information as well as the time of day and the phone number they called
from.

I have had some experience as I had a similar situation with a server in
the US and a misbehaving client (libel in case you were curious),  This
sounds fishy to me.  You are not Shaw's customer, they should not be
contacting you.


>     * My host isn't as right as he thinks he is
> 
This is certainly possible.  Hubris sets you up for a terrible fall.

> As a precaution, I've wiped out the MySQL database on the website. My
> hosting providor disabled DNS resolution until I give him notice as
> well. At this point, I'm looking for options. I don't wanna get sued...
> Here's my plan of action, I'd be grateful for input

I have seen more than a few worms get in via bad php code.  Some
precautions, I keep the web root on its own partition, with noexec and
nosuid in the fstab.  If possible avoid programs that are not compatible
with PHP safe mode.

/tmp is its own partition with noexec

ALL mount points have extended ACLs configured.  This is really worth
learning.

Also nmap, gcc, nessus etc, do not belong on production servers!

> 
>    1. Call Shaw in the morning, get the specific ip address of the hacker\
This is what they should be doing,  Using reverse DNS is lame.  They
should not give out that information anyway, as it should be the police
who gets this info (ironically, they may violate FOIP by giving you this
info).  You should only be informed if it is your IP, in your case, you
don't actually own your IP, your provider does (he or she may be leasing
it from someone else, but the point is that I highly doubt that you
"own" the IP itself.

>    2. See if that IP has a DNS entry for my domain
Doesn't really matter.
host xxx.xxx.xxx.xxx will tell you what the reverse DNS is, but that
doesn't really mean anything.

whois -h whois.geektools.com xxx.xxx.xxx.xxx will tell you who owns the IP.
(tip, I alias this in my .bashrc, eg. alias whois="whois -h
whois.geektools.com")


>    3. If 2 = true, then KICK THAT PERSONS ASS
Not your job

>    4. If 2 = false, then KICK HOSTS ASS
Also not your job.

Since it is Shaw being attacked, it is really up to them to involve the
appropriate law enforcement agency.  You will likely not be able to
figure out whose ass to kick, no offense, but they are likely better at
hiding than you are at finding.  Assuming of course that your box has
not been compromised and is not in fact the source of the port scanning.

Like Shawn said, do the due diligence part, document your steps, and
make *sure* that your box is secure.

> 
> Sigh. This is the end of my rant for the moment. God give me strength!
<flame bait snipped... I have very strong thoughts on this, but they are
not appropriate for this list :) >


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFJh13wRXgH3rKGfMRAvQ/AJ9+SwreIAOkLbjezsOdGcSL+D+UuwCffSyL
WjH0wv1fB1GA6iMD0XEEo0o=
=kb9F
-----END PGP SIGNATURE-----

_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to