On Mon, Sep 13, 2004 at 10:06:05PM -0400, Adam Aube wrote: > Kevin Mark wrote: > > > There are no top secret things on my system, so full reinstall is not an > > urgency. > > You have disk space and bandwidth - many times that's all an attacker wants. > > > I also checked 'top' for any unexpected processes and there was none.of > > course if top,ps and the kernel were replaced, then maybe I wouldn't know > > 1) Boot from a live cd and chroot to your local system > 2) Use debsums (preferably copied from the live CD) to verify the integrity > of the libraries and binaries in your installed packages > 3) Reinstall packages whose binaries or libraries do not match > > Of course, the attacker could have trojaned your local apt cache, debsums' > dependencies, apt-get/aptitude, dpkg, your startup scripts, etc. > > Eventually it just becomes easier to back up your data and wipe and > reinstall the system then to try to fully verify that the system is secure. > > Adam >
Hi Adam,
8GB (1.6 left) does not a warez archive make :-)
I looked at the ssh attack articles and the attacker left my root
.bash_history and /var/log/auth.log and attemted to download some tgz.
As the article suggesed, this guy (at least this time) was not a guru.
I check the dates of some of the suggested bin's like ps, md5sum and
they were the orig. As I said, after a dist-upgrade of 300 pkgs, much
will not be UNtouched. of couse, dist-upgrades do not affect ALL pkgs,
like some of the core one, so that would have to be 'reinstalled'.
I have not seen unexpeced segfaults, unexpected ssh activity (now sshd
is not allowing remote root logins!) or other wierdness. When I have the
inclination, I'll have fun with the new debian-installer.
Cheers,
-Kev
--
(__)
(oo)
/------\/
/ | ||
* /\---/\
~~ ~~
...."Have you mooed today?"...
signature.asc
Description: Digital signature

