>Good. Now check for all the other places it could be in :>

I did an ls -alR | grep...  and it came up clean.

>1.     Modify the rc start up scripts to create a setuid shell
>       somewhere.

clean...

>2.     Create a root cron that does the same.

also clean.  I checked all the cron jobs after finding /bin/ns set to run
every minute as root.  I have no idea what it does/did, but I didn't put it
there, and it isn't running now.

>3.     Put an innocuous looking entry in inetd.conf which actually
>       starts a process as root for you.

just found this appended to the last line of the file, right after the qmail
entry I had installed the night before:
  linuxconf stream tcp wait root /bin/linuxconf linuxconf --http

I certainly don't remember putting it there, so this makes me thing the
breach is worse than I at first thought.  :/

>4.     Create an innoucuous looking user (nobody4 is a goodie) with a
>       uid of zero and a password you know.
>5.     Install an old version of sendmail.
>6.     Replace the passwd command with a wrapper that sends the username
>       and password to a remote address.
>7.     Modify your .profile to create a function for su that traps the
>       root password and emails it somewhere.

Clean (for now)

Oh well, I'm learning a lot, which was part of the reason I built the server
in the first place.  Thanks for the input.

PS>  In case you are wondering, no, I'm not mailing from that server.  I'm
on a different network all together.  :)

Reply via email to