whois [EMAIL PROTECTED]




On Wed, 8 Dec 1999, Jeff Graves wrote:

> I found an the address of someone that was running some services they 
> shouldn't have tried to run. Not only did my mail server get hacked but 
> an attempt was made on my primary dns server as well. I found an IP that 
> repeatedly tried using telnet and finger as well as ftp. How do I find 
> who owns it? Tried an nslookup with no luck. Tried a ping with no luck. 
> Traceroute turns up a bunch of other IP address in that subnet with no 
> domain name. Any ideas?
> 
> TIA
> jeff
> 
> -----Original Message-----
> From: Jeff Hogg [SMTP:[EMAIL PROTECTED]]
> Sent: Wednesday, December 08, 1999 1:53 PM
> To:   [EMAIL PROTECTED]
> Subject:      Re: Got hacked, need to make sure it doesn't happen again
> 
> 
> -----Original Message-----
> From: Jeff Graves <[EMAIL PROTECTED]>
> To: '[EMAIL PROTECTED]' <[EMAIL PROTECTED]>
> Date: Wednesday, December 08, 1999 12:31 PM
> Subject: Got hacked, need to make sure it doesn't happen again
> 
> 
> >My mail server got hacked last night. I guess i was asking for it 
> though. I
> >didn't really do any security checks close any ports. In fact I just
> >installed everything and left everything open. At any rate, i came in 
> this
> >morning and everything wasn't working. I had to reinstall and setup
> >sendmail and the pop3 service all over again. And add all the users. It
> >took about 3 hours. I was just wondering if anyone can tell me what logs 
> i
> >should monitor all the time and what i need to shut off. I reinstalled 
> the
> >server using the bare minimum. It has sendmail, the linux kernel, 
> apache,
> >some ftp services, and a couple of other things. Other than than, it's
> >empty. I needed apache because i want to run some sort of Internet front
> >end for my users so they can check their mail. Anyway, i have a few 
> books
> >I'm tearing apart doing everything i can but I figured first-hand tech
> >knowledge is probably the best adivce. Any help?
> 
> 
> That had to hurt.. I'm about to open my own site here, and I've been 
> working
> on learning what your trying to learn as well.  I don't know enough to be
> called an expert, but it can't hurt to start somewhere.  I would suggest 
> a
> careful writting of your hosts.allow and hosts.deny files.  I would also
> suggest downloading and installing ipchains.  I think you can get an rpm
> from most redhat mirrors.  I've got a ip masqueraded LAN set up here in 
> my
> office and have had to apply some security to the linux box I use as a
> "router".  It's set up with only those services I have a need for.  It 
> has a
> hosts.deny of ALL:ALL and a hosts. allow of ALL:10.0.0.  and 
> ALL:127.0.0.1
> to allow the local lan and the localhost to use those services.  I also 
> set
> up ipchains to do the following:
> 
> deny all ip forwarding by default.
> allow ip forwarding for just my local lan
> I deny all connection attempts comming into my modem.
> 
> The ipchains rules are fairly simple to use and seem very effective.  I 
> have
> had no attempts succeed against this system so far.  Hopefully that state
> will continue.  I think it is a bit harder with a true server where ports
> need to be open, but you can still restrict entry to just those ports, 
> and
> stop others from pretending to be a machine on your network.  I hope this
> helps.  Others will probably add a lot more :)
> 
> Jeff Hogg
> 
> 
> --
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.
> 
> 
> -- 
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.
> 

-----------------------------------------------------
Brian Feeny (BF304)     [EMAIL PROTECTED]   
318-222-2638 x 109      http://www.shreve.net/~signal      
Network Administrator   ShreveNet Inc. (ASN 11881)            


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to