Now.....I might be talking crazy here....but I think I have the total fix for 
everything.

Step 1) OS Restore
Step 2) Put the Unit on a private IP so you can install the packages*
Step 3) Reboot and go live

Sorry that this is a replay to you alex.....no your not the target of this Clue-by-4.

For anyone who didn't know....one of the main functions of this exploit is the 
installation of a
root kit that makes your cobalt server......A PortScanner.  PortScanners spend their 
time scanning

various subnets all over the internet.  So putting an unprotected box on the internet 
without the
patches and trying to install them while a port scan can get to it.....is 
well....asking for it.

And a lot of people discovered that they had been rehacked after the update....and 
cried, "we had
the patches installed."  But BIND can't close a hole if its already open.  And for the 
few
experiences I've seen, the timestamps of when the exploit went in and when the BIND 
update went in
are close, usually the exploit beating out the update by about 20 mins.

So, while every cobalt customer is learning a little something about good sysadmin 
(it's usually a
disaster that teaches us the best)....lets not point the fingers here.  And of 
course....hey at
least its not Windows....

And as for the 8.2.2-P7....umm yeah thats the default software installed....or at 
least I thought
so.  But I didn't think that BIND 8.2.3 was released until post the first signs of the 
exploit. 
It was my understanding that it was the BIND community that was caught with their pants
down....not Cobalt.  I mean this affected BIND not Cobalt right.  It is a BIND exploit 
right?

Or maybe I'm just rambling

--------------------
AJC <[EMAIL PROTECTED]>
Rule 1 of Sysadmin : backup the file






--- Alex Lee <[EMAIL PROTECTED]> wrote:
> > We did not use a Cobalt patch to fix the compromised servers - we had to
> > design custom scripts and gather files to fix them. I guess the patch kits
> > made by Cobalt were not adequate to protect your machine against
> > this virus.
> > Cobalt must have decided that 8.2.2-P7 was good enough even though the
> > warnings said 8.2.3 was the answer. I'm not sure if they have a
> > more recent
> > patch kit or not.
> 
> The Cobalt patch does put in 8.2.3-REL
> 
> [root /root]# ndc status
> named 8.2.3-REL Tue Jan 30 16:56:25 PST 2001
> [EMAIL PROTECTED]:/home/redhat/BUILD/bind-8.2.3/src/bin/named
> config (/etc/named.conf) last loaded at age: Wed Jan  3 17:26:50 2001
> number of zones allocated: 64
> debug level: 0
> xfers running: 0
> xfers deferred: 0
> soa queries in progress: 0
> query logging is OFF
> server is up and running
> 
> 
> alex
> 
> _______________________________________________
> cobalt-developers mailing list
> [EMAIL PROTECTED]
> http://list.cobalt.com/mailman/listinfo/cobalt-developers


=====
--------------
#!/usr/bin/perl

print "Have Clue Will Travel";
--------------

__________________________________________________
Do You Yahoo!?
Yahoo! Auctions - buy the things you want at great prices
http://auctions.yahoo.com/

_______________________________________________
cobalt-developers mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-developers

Reply via email to