Hi all,

I've always been pretty careful about security but I made a mistake
this weekend and I wanted to share it with everyone here.

Over the weekend I configured a new server for my game hosting
company.  I went through the same basic process I always go through
before installing the machine in the colocation facility.  I lock
everything down with very restrictive firewall settings and I disable
everything that isn't absolutely necesary for running halflife mods.

After testing the machine out for a day or two I got a bit lazy and
decided to open up wu-ftp so I could use a regular ftp program to
upload files.

I had the port open for a few hours when someone hacked into the
system using a wu-ftp vulnerability.  They installed their own
rootkit, overwriting the contents of about 60 files in the /bin
directory.  They created several "group 0" accounts and installed a
few processes of their own.

I was very lucky to catch this person.  On any other day he could
have gotten in entirely unnoticed, installed his software, and left
my system in a state where he would be invisible to further
inspection.

I'll have to do a reinstall now.  I've cleaned up all results of his
break-in as best I can but it wouldn't be fair to my customers to
risk their information.  Reinstalling is really the only choice in
this situation.

Here is my advice, geared for linux users:

1.  DO NOT RUN: ftp, irc, bind, pop, or any other unnecessary service
on a gaming machine.  Run sshd on the gaming server and put the other
processes on another machine.
2.  Run chkrootkit periodically to detect the presence of known
rootkits.
3.  Use ipchains or iptables to block everything you do not
absolutely need.
4.  Configure all users except yourself to run in a chrooted jail, if
you aren't doing so already.  Incidentally, I did this and it is part
of what helped me catch him, as he had to edit /etc/ftpaccess to give
himself priveleges on the accounts he created.  The hacker forgot to
change /etc/ftpaccess back to the original.  If he had, I may never
have noticed any problems at all.
5.  Install AIDE, a free program that makes it easy to know when
someone has been on your system.
6.  DO NOT RUN ANY HALFLIFE PROCESSES THAT ALERT THE WORLD ABOUT YOUR
SERVERS UNTIL THE ABOVE STEPS ARE TAKEN.  I believe that the hacker
found out about my vulnerability by watching a program like gamespy
for new servers.  He happened to catch me while wu-ftp was running.
This guy, and people like him, are probably looking at these server
lists every day for new machines they can use.
7.  Do not use the same root password on multiple machines.  I have
different passwords on my machines which is a real blessing at a time
like this.  I don't have to worry that some trojan program has
captured my password and will enable a hacker to get onto my other
machines.
8.  Remember that a hacker doesn't necessarily want to take your
system down.  In my case I have a dual AMD 1800+ machine with 1.2 Gig
of memory and 200 Gig of HD space.  This is an ideal server for
halflife, but is also a great server for dealing in illegal child
porn, bootleg videos, MP3s, etc.  Hackers want to use your machine so
they install rootkits that make it very hard to detect them.  Next
time I build a machine I'll use smaller drives so it won't be as
tempting.
9.  Is your server acting funny?  Does ps work in a way you don't
expect?  Having trouble logging in sometimes?  Has your machine
become slow, is it using more bandwidth than you expect?  Does your
disk hover near capacity but you can't find the files that are
causing the problem?  Chances are you have been hacked.
10.  If you think you have been compromised, don't trust ps, last,
who, .bash_history, ls, etc to tell you anything.  Hackers leave
their own versions of these files so that you can't see what they are
doing.  In my case the hacker used a version of ps that hid 3
processes from me.

*IMPORTANT*
If you are running wu-ftp and a halflife server I hate to break it to
you but you should just assume you are compromised.  It took just a
few hours for my machine.  Get paranoid but don't panic.  The first
thing you should do is install chkrootkit.  Its free and easy to use
and it will give you a good indication of whether you've been hit.

I'd like to work with some other admins to create a security guide
for game servers.  If you are interested reply to this thread or
email me at [EMAIL PROTECTED]

Jim

__________________________________________________
Do You Yahoo!?
Yahoo! Health - Feel better, live better
http://health.yahoo.com
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to