huh, wu-ftpd, why use that when you can "apt-get install proftpd" :)

/Oscar, www.bhood.nu


James Bourke wrote:

>Hi all,
>
>I've always been pretty careful about security but I made a mistake
>this weekend and I wanted to share it with everyone here.
>
>Over the weekend I configured a new server for my game hosting
>company.  I went through the same basic process I always go through
>before installing the machine in the colocation facility.  I lock
>everything down with very restrictive firewall settings and I disable
>everything that isn't absolutely necesary for running halflife mods.
>
>After testing the machine out for a day or two I got a bit lazy and
>decided to open up wu-ftp so I could use a regular ftp program to
>upload files.
>
>I had the port open for a few hours when someone hacked into the
>system using a wu-ftp vulnerability.  They installed their own
>rootkit, overwriting the contents of about 60 files in the /bin
>directory.  They created several "group 0" accounts and installed a
>few processes of their own.
>
>I was very lucky to catch this person.  On any other day he could
>have gotten in entirely unnoticed, installed his software, and left
>my system in a state where he would be invisible to further
>inspection.
>
>I'll have to do a reinstall now.  I've cleaned up all results of his
>break-in as best I can but it wouldn't be fair to my customers to
>risk their information.  Reinstalling is really the only choice in
>this situation.
>
>Here is my advice, geared for linux users:
>
>1.  DO NOT RUN: ftp, irc, bind, pop, or any other unnecessary service
>on a gaming machine.  Run sshd on the gaming server and put the other
>processes on another machine.
>2.  Run chkrootkit periodically to detect the presence of known
>rootkits.
>3.  Use ipchains or iptables to block everything you do not
>absolutely need.
>4.  Configure all users except yourself to run in a chrooted jail, if
>you aren't doing so already.  Incidentally, I did this and it is part
>of what helped me catch him, as he had to edit /etc/ftpaccess to give
>himself priveleges on the accounts he created.  The hacker forgot to
>change /etc/ftpaccess back to the original.  If he had, I may never
>have noticed any problems at all.
>5.  Install AIDE, a free program that makes it easy to know when
>someone has been on your system.
>6.  DO NOT RUN ANY HALFLIFE PROCESSES THAT ALERT THE WORLD ABOUT YOUR
>SERVERS UNTIL THE ABOVE STEPS ARE TAKEN.  I believe that the hacker
>found out about my vulnerability by watching a program like gamespy
>for new servers.  He happened to catch me while wu-ftp was running.
>This guy, and people like him, are probably looking at these server
>lists every day for new machines they can use.
>7.  Do not use the same root password on multiple machines.  I have
>different passwords on my machines which is a real blessing at a time
>like this.  I don't have to worry that some trojan program has
>captured my password and will enable a hacker to get onto my other
>machines.
>8.  Remember that a hacker doesn't necessarily want to take your
>system down.  In my case I have a dual AMD 1800+ machine with 1.2 Gig
>of memory and 200 Gig of HD space.  This is an ideal server for
>halflife, but is also a great server for dealing in illegal child
>porn, bootleg videos, MP3s, etc.  Hackers want to use your machine so
>they install rootkits that make it very hard to detect them.  Next
>time I build a machine I'll use smaller drives so it won't be as
>tempting.
>9.  Is your server acting funny?  Does ps work in a way you don't
>expect?  Having trouble logging in sometimes?  Has your machine
>become slow, is it using more bandwidth than you expect?  Does your
>disk hover near capacity but you can't find the files that are
>causing the problem?  Chances are you have been hacked.
>10.  If you think you have been compromised, don't trust ps, last,
>who, .bash_history, ls, etc to tell you anything.  Hackers leave
>their own versions of these files so that you can't see what they are
>doing.  In my case the hacker used a version of ps that hid 3
>processes from me.
>
>*IMPORTANT*
>If you are running wu-ftp and a halflife server I hate to break it to
>you but you should just assume you are compromised.  It took just a
>few hours for my machine.  Get paranoid but don't panic.  The first
>thing you should do is install chkrootkit.  Its free and easy to use
>and it will give you a good indication of whether you've been hit.
>
>I'd like to work with some other admins to create a security guide
>for game servers.  If you are interested reply to this thread or
>email me at [EMAIL PROTECTED]
>
>Jim
>
>__________________________________________________
>Do You Yahoo!?
>Yahoo! Health - Feel better, live better
>http://health.yahoo.com
>_______________________________________________
>To unsubscribe, edit your list preferences, or view the list archives, please visit:
>http://list.valvesoftware.com/mailman/listinfo/hlds_linux
>
>



_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to