First of all..Why does the counter-strike web page now go to.
http://dc3.cogitive.com/sbcdc/www.counter-strike.net/index.html

Second of all..Why cannot I authenticate to WON ??

It was working .. now it isnt.


James Bourke wrote:
>
> Hi all,
>
> I've always been pretty careful about security but I made a mistake
> this weekend and I wanted to share it with everyone here.
>
> Over the weekend I configured a new server for my game hosting
> company.  I went through the same basic process I always go through
> before installing the machine in the colocation facility.  I lock
> everything down with very restrictive firewall settings and I disable
> everything that isn't absolutely necesary for running halflife mods.
>
> After testing the machine out for a day or two I got a bit lazy and
> decided to open up wu-ftp so I could use a regular ftp program to
> upload files.
>
> I had the port open for a few hours when someone hacked into the
> system using a wu-ftp vulnerability.  They installed their own
> rootkit, overwriting the contents of about 60 files in the /bin
> directory.  They created several "group 0" accounts and installed a
> few processes of their own.
>
> I was very lucky to catch this person.  On any other day he could
> have gotten in entirely unnoticed, installed his software, and left
> my system in a state where he would be invisible to further
> inspection.
>
> I'll have to do a reinstall now.  I've cleaned up all results of his
> break-in as best I can but it wouldn't be fair to my customers to
> risk their information.  Reinstalling is really the only choice in
> this situation.
>
> Here is my advice, geared for linux users:
>
> 1.  DO NOT RUN: ftp, irc, bind, pop, or any other unnecessary service
> on a gaming machine.  Run sshd on the gaming server and put the other
> processes on another machine.
> 2.  Run chkrootkit periodically to detect the presence of known
> rootkits.
> 3.  Use ipchains or iptables to block everything you do not
> absolutely need.
> 4.  Configure all users except yourself to run in a chrooted jail, if
> you aren't doing so already.  Incidentally, I did this and it is part
> of what helped me catch him, as he had to edit /etc/ftpaccess to give
> himself priveleges on the accounts he created.  The hacker forgot to
> change /etc/ftpaccess back to the original.  If he had, I may never
> have noticed any problems at all.
> 5.  Install AIDE, a free program that makes it easy to know when
> someone has been on your system.
> 6.  DO NOT RUN ANY HALFLIFE PROCESSES THAT ALERT THE WORLD ABOUT YOUR
> SERVERS UNTIL THE ABOVE STEPS ARE TAKEN.  I believe that the hacker
> found out about my vulnerability by watching a program like gamespy
> for new servers.  He happened to catch me while wu-ftp was running.
> This guy, and people like him, are probably looking at these server
> lists every day for new machines they can use.
> 7.  Do not use the same root password on multiple machines.  I have
> different passwords on my machines which is a real blessing at a time
> like this.  I don't have to worry that some trojan program has
> captured my password and will enable a hacker to get onto my other
> machines.
> 8.  Remember that a hacker doesn't necessarily want to take your
> system down.  In my case I have a dual AMD 1800+ machine with 1.2 Gig
> of memory and 200 Gig of HD space.  This is an ideal server for
> halflife, but is also a great server for dealing in illegal child
> porn, bootleg videos, MP3s, etc.  Hackers want to use your machine so
> they install rootkits that make it very hard to detect them.  Next
> time I build a machine I'll use smaller drives so it won't be as
> tempting.
> 9.  Is your server acting funny?  Does ps work in a way you don't
> expect?  Having trouble logging in sometimes?  Has your machine
> become slow, is it using more bandwidth than you expect?  Does your
> disk hover near capacity but you can't find the files that are
> causing the problem?  Chances are you have been hacked.
> 10.  If you think you have been compromised, don't trust ps, last,
> who, .bash_history, ls, etc to tell you anything.  Hackers leave
> their own versions of these files so that you can't see what they are
> doing.  In my case the hacker used a version of ps that hid 3
> processes from me.
>
> *IMPORTANT*
> If you are running wu-ftp and a halflife server I hate to break it to
> you but you should just assume you are compromised.  It took just a
> few hours for my machine.  Get paranoid but don't panic.  The first
> thing you should do is install chkrootkit.  Its free and easy to use
> and it will give you a good indication of whether you've been hit.
>
> I'd like to work with some other admins to create a security guide
> for game servers.  If you are interested reply to this thread or
> email me at [EMAIL PROTECTED]
>
> Jim
>
> __________________________________________________
> Do You Yahoo!?
> Yahoo! Health - Feel better, live better
> http://health.yahoo.com
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds_linux
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to