On Wed, Oct 04, 2000 at 01:11:56PM -0400, Kurth Bemis wrote:
> At 10:58 AM 10/4/2000 -0400, Tony Lambiris wrote:
>
> i was good friends with mosthated ( the leader of global hell ) - he had
> commented to me several times that that cs at keene boxes had telnetd open
> along other things...i told him that i didn't goto keene state and that was
> it.....i can't recall the exact date i think that it was around
> 00.01.10. Then later that year....1 month csdept.keene.edu was
> rooted. You'd think that after one incident you'd shut down telnet and put
> openssh on there....nop..it too to to lock down that box....
>
That's what I'm saying, the box was wide open (due to the fact Red Hat seems
to like to enable _everything_), so it was just a matter of time. Just check
out attrition.org. That box was rooted multiple times before whoever touched
it last tried hacking a bank. Perhaps the faculty should've appointed a new
admin after the first incident.
> <preaching>
> if your have a box on the Internet and you don't know your security your
> going to get owned. simple as that.....we're have several attempts on the
> usa box and that woke me up...fast....i realized that just because i didn't
> find any sploits that i could hack it didn't mean that there were none.....
>
VERY well put.
> redhat is a nice distro - however if your security minded ( and all .edu's
> should be ) put all your linux boxes on thier own network using and have a
> box doing NAT....your public machines...use openBSD...simple as
> that.....redhat is leaning toward being a desktop distro...and NT isn't
> secure....its a DOS waiting to happen....
>
I totally agree. I think the only linux dist. I would trust would be slackware,
and that's after I did a minimal install, deleted all suid files, and took
care of other stuff (inetd.conf, fstab, etc.).
> junior sys admin is a good idea - however using it on a mission critical
> server isn't a good idea...set it up as a war box...then you learn real
> fast what's what with security.
>
> the biggest asset that i have had is making friends with "script kiddies"
> and "black hats". just chatting they keep me informed on the latest holes
> and such. its a little work for a large return....many times a exploit
> will be discovered and be used to up to 4 months before a place like
> bugtrack gets it. for the price of a shell for annon mail..its a big payoff.
>
> </preaching>
>
Exactly. Just because you can't find an exploit for a service, doesn't mean
it's not out there. This is were I disagree with Red Hat enabling _everything_
by default. It's just a really stupid thing to do. Most people running Red Hat
will be using it for a workstation, this they have no need for ftpd, or amd.
If it's going to be used as a server, then it's up to the admin to know what
to enable and how. It's as simple as that.
> i agree totally with tony's last paragraph - sever security is up the the
> server admin( or person appointed for security) and nobody else.
>
> i'll admit it - i'm not the best security guy in the world, but i know what
> to look at and what not to....and monitor our server(s) closely....in 2
> months we're installing 2 new servers using openBSD with qmail and apache
> 1.3.12. granted i'll still have to monitor it but it will make my job a
> lot easier. and make balck hats jobs a lot harder.
>
> well i think that i'm done with my preaching...
>
> if i have offended anyone - i apologize...but when i stuff like this it
> really get me going. why punish everybody when one is at fault.
>
> BTW - look at this...i just did this nmap scan of csdept.keene.edu -
> intresting? i think so....lets shut down some of those deamons! 'eh?
> ========================
> Starting nmap V. 2.12 by Fyodor ([EMAIL PROTECTED], www.insecure.org/nmap/)
> Interesting ports on cscipclab5.keene.edu (158.65.240.101):
> Port State Protocol Service
> 1 open tcp tcpmux
> 11 open tcp systat
> 15 open tcp netstat
> 22 open tcp ssh
> 79 open tcp finger
> 80 open tcp http
> 111 open tcp sunrpc
> 113 open tcp auth
> 119 open tcp nntp
> 143 open tcp imap2
> 540 open tcp uucp
> 635 open tcp unknown
> 959 open tcp unknown
> 1024 open tcp unknown
> 1080 open tcp socks
> 1524 open tcp ingreslock
> 2000 open tcp callbook
> 6667 open tcp irc
> 12345 open tcp NetBus
> 12346 open tcp NetBus
> ========================
>
> well they got rid of telnetd what about netbus? is that necessary to run :-)
>
Will they ever learn? ;)
> ~kurth
>
> >On Tue, Oct 03, 2000 at 06:50:14PM -0400, Mjo wrote:
> > > We have 2 leads into a few 486 machines, which will help emmensely! YAY!
> >
> >What do you plan on using these 486 machines for? Only thing I can think of
> >that a 486 could handle would be simple NAT, or perhaps a mail server that
> >doesnt have a big work load.
> >
> > >
> > > KSC has traditionally had a Linux server that held student accounts for
> > mail
> > > and web pages. "Junior Sys Admin" was an independent study for running
> > this
> > > box. This summer it was used by a couple of people to break into
> > places such as
> > > Bell Atlantic. The college administration has in absolutely no
> > uncertain terms
> > > decreed that we may only have a Linux box if it is NOT attached to the
> > outside
> > > world. This is unfortunately not up for any debate. Linux in a vacum
> > makes
> > > very little practical sense, but that's what we have to work
> > with. Because
> > > this makes the "Junior Sys Admin" role almost entirely moot, it will be
> > > WONDERFUL to keep Linux possibilities here through the LUG.
> >
> >Yeah, I knew the Senior Admin of that box. He was a nice guy, but he didn't
> >know anything about Linux. When I first went to Keene, it was running
> >Slackware
> >setup by this kid Jamie Fullerton(sp?) who definately knew his stuff. Then
> >something happened (can't remember what), and Shilo decided to install Red
> >Hat.
> >First of all, that was probably his first mistake. I just read on Slashdot
> >that
> >Red Hat 7.0 had over like 2,500 documented bugs, or something outrageous like
> >that. I'm not saying Red Hat can't be locked down, but it is definately the
> >last distribution I would look at for a server environment. That, and coupled
> >with the fact he didn't know how to secure a box made for an easy target. He
> >always installed the defaults in Red Hat (I watched him install Red Hat one
> >time), and didn't take care to remove anything he wasn't using or didn't need.
> >During the first few weeks, I gave him some friendly pointers on making
> >the box
> >a little more secure without going into stuff like suid binaries, or editing
> >his fstab, and he replied back saying that he didn't appriciate me trying to
> >tell him how to do his job. Perhaps it was jealousy (mind you I was a
> >freshman,
> >and he was a junior), but I guess I will never know. I think it was about that
> >time when I knew Keene State College was a waste of my time and money.
> >Needless to say, when that box was cracked, my name came up a few times.
> >Why? I believe the main reason to be the fact that I actually _knew_ what
> >I was
> >doing in a Linux environment. I do wish the KSCLUG all the luck in the world
> >with their Linux ventures, it's unfortunate that they can't connect the linux
> >box to the outside world, because IMHO, it should be the admin's fault,
> >not the
> >colleges, because a Linux box can be secured, as long as the admin knows what
> >he/she is doing.
> ></rant> :)
> >
> > > We had a fair mix of people. A few newbies, a few middle-ish (like
> > myself) and
> > > a few who have spent a lot of time running it, though not professionally.
> > >
> > > Here are some of the topics people expressed interest in on the sheet I
> > passed
> > > out:
> > > Apache esp writing modules
> > > Security
> > > Relational DBs
> > > Scripting languages, i.e. TCL
> > > DHCP
> > > Programming in Linux C/Java/etc
> > > Sniffers
> > >
> > > I'm sure there will be a lot more. Any ideas invited.
> > >
> > > Anyway, getting rather long here. I often feel like I spend my entire life
> > > with the -v switch on.
> > >
> > > Our next meeting is 2 weeks from now, Tuesday October 17th at 1:30 pm in
> > > Science 119 at Keene State. The agenda is to vote on our constitution,
> > elect a
> > > couple officers, install some distro or other on a machine we can get
> > our hands
> > > on. Shiloh, our ex-linux admin/current NT admin is setting up an
> > e-mail list
> > > for us.
> > >
> > > Any and all advice/help very, very welcome!
> > >
> > > -Marthajo McCarthy
> > > KSCLUG Chairman
> > >
> > > P.S. I just bought a palm pilot- if anyone has any astounding tips on
> > how to
> > > get it working in Linux, feel free to e-mail me!
> > >
> > > --
> > > Martha Jo McCarthy
> > > [EMAIL PROTECTED] (alternate: [EMAIL PROTECTED]) Yeehaa!
> > >
> > >
> > >
> > >
> > > **********************************************************
> > > To unsubscribe from this list, send mail to
> > > [EMAIL PROTECTED] with the following text in the
> > > *body* (*not* the subject line) of the letter:
> > > unsubscribe gnhlug
> > > **********************************************************
> >
> >--
> >Tony Lambiris [[EMAIL PROTECTED]]
> >OpenBSD: Because I care. [www.openbsd.org]
> >
> >
> >**********************************************************
> >To unsubscribe from this list, send mail to
> >[EMAIL PROTECTED] with the following text in the
> >*body* (*not* the subject line) of the letter:
> >unsubscribe gnhlug
> >**********************************************************
>
> Kurth Bemis - Network/Systems Administrator, USAExpress.net/Ozone Computer
>
> [EMAIL PROTECTED]
> http://www.usaexpress.net/kurth
> ICQ - 6624050
> Call Sign - N1TYW
> PGP key available - http://www.usaexpress.net/kurth/pgp
>
> Fight Weak Encryption! Donate your wasted CPU cycles to Distributed.net
> (http://www.distributed.net)
>
>
--
Tony Lambiris [[EMAIL PROTECTED]]
OpenBSD: Because I care. [www.openbsd.org]
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************