Has this issue been resolved?
Can we be sure this doesn't lead back to a 
potentially vulnerable component of openssh?

Can you provide any further information?
Did you find the point of entry? (compromise)

Greetings,
Patrick

--
Patrick Geschke
Systemadministration

Top Arbeitgeber 2011!
KiKxxl wurde von TOP JOB als zweitbester Arbeitgeber in Deutschland 
ausgezeichnet.

KiKxxl GmbH
Mindener Strasse 127
49084 Osnabrück

Tel.: 0541 / 3305 0
Fax : 0541 / 3305 100 
Mail: [email protected]
WWW : http://www.kikxxl.de

Niederlassung Bremen
Hermann-Köhl-Straße 1a
28199 Bremen

Sitz der Gesellschaft Osnabrück, 
HRB 18841, Amtsgericht Osnabrück 
Geschäftsführer Andreas Kremer


-----Ursprüngliche Nachricht-----
Von: Noah Meyerhans [mailto:[email protected]] 
Gesendet: Donnerstag, 29. Dezember 2011 20:46
An: [email protected]
Betreff: Re: need help with openssh attack

On Thu, Dec 29, 2011 at 11:30:27PM +0400, Taz wrote:
> Anybody want's to check it out?
> I can provide ssh access, if u will give me ssh key.

>From the sound of things, we're not going to find much.  It's clear that the 
>attackers have already cleaned up their tracks by editing auth.log, etc.  The 
>detailed forensics needed here would likely take a fair bit of time.  Also, 
>because we'd be working on a compromised host, we likely couldn't even trust 
>our own tools to give us accurate information.
File-system level forensics would be best performed on a block-level image of 
the disk itself (e.g. made using something like dd).

One recommendation I've got for future deployments, if you can allocate the 
resources for it, is to have a dedicated syslog host.  This host should not run 
any services other than syslogd, including ssh.  Any access would need to be 
via the console.  You should be careful to give it a unique root password, and 
probably don't even bother to create any non-root accounts on it.  Configure 
the rest of your hosts to send their logs to this host.  Having a copy of 
things like auth.log whose integrity can be trusted would be most helpful here.

noah


--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: 
http://lists.debian.org/[email protected]

Reply via email to