‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Thursday, April 4, 2019 1:41 PM, Peter N. M. Hansteen <[email protected]> 
wrote:

> On Wed, Apr 03, 2019 at 06:56:39PM +0000, Cord wrote:
>

Please read my last email to misc, I tried to explain again.


> If you see ssh sessions that shouldn't be there, kill those sessions.

Honestly this is not the problem.

>
> Then before they log in again, do whatever changes are required such as 
> generating
> new keys, changing your password or similar, and of course clean up your sshd 
> config.
>
> From your (not very precise) description it could even be that a separate set 
> of
> binaries have been installed in addition to the system sshd. Look for those 
> too.
>
> Basically, do not trust your system as it is. Wipe, reinstall and rebuild 
> should be an option.
>

"Second time" of my title means:
Install first time openbsd desktop --> ssh key stealing --> hacked --> wipe and 
reinstall
Install second time openbsd desktop --> not my webmail session opened --> maybe 
hacked --> wipe and reinstall
Then you are saying I must wipe and reinstall once a month till the end of my 
life ?


> For the webmail access, do change your password and if they support it, look 
> into
> any multi-factor authentication options.
>

I don't know if this is useful. I mean if the hacker has the session cookie 
probably he can browser my email without any authentication.

> Moving forward, learn how to read and interpret logs and for that matter 
> packet captures.
>

ok, but a kernel rootkit doesn't leave traces.

> The information you have offered up does not give any indication how the 
> suspected
> attackers got hold of enough information to get access (if indeed it is what 
> happened).
>



> That information could possibly be found in your logs, but in my experience 
> it is far
> more likely that somebody with access to the system made some stupid mistake 
> such
> as clicking a link in a mailed webpage, speaking their password out loud 
> within
> hearing distance of somebody with enough context information to be able to 
> use it,
> or something else equally cringeworthy. Then your logs would only show a 
> successful
> login, perhaps from somewhere unexpected, as the start of the compromise.
>

My openbsd desktop has no tcp services active, I have some udp listening that 
is openvpn and chrome. But I have pf enabled.
If you want I can paste my pf conf. But it's few lines, and the last is "block 
drop log all"

> I hope some of this stream of semi-random items is of some use.
>

thank you

> Peter N. M. Hansteen, member of the first RFC 1149 implementation team
> http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
> "Remember to set the evil bit on all malicious network traffic"
> delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.


Reply via email to