Dear Lewi (et al.), On Wed, 28 Aug 2002 22:10:06 +0700, Lewi <[EMAIL PROTECTED]> wrote:
> I just checking whereis passwd place from, when I run this > # whereis passwd > passwd: /bin/passwd /usr/bin/passwd /etc/passwd.OLD /etc/passwd > /usr/share/man/man1/passwd.1.gz > > then I checked > # rpm -qf /bin/passwd > file /bin/passwd is not owned by any package > > # rpm -ql passwd-0.64.1-4 > /etc/pam.d/passwd > /usr/bin/passwd > /usr/share/man/man1/passwd.1.gz > > so where /bin/passwd come from?? > I checked using whether maybe I can get something, > # string /bin/passwd > but I don't found any suspicious line > I attached in here, sory if too big, it just 3,5kb :) > I'm using rh7.1 > > <snip> Yes, this looks very wrong, so you may have been "rooted." I'd run "pstree -u" and see if there are any strange new processes operating. The "top" command might work, and obviously the /proc file system will give you all the process information, but you may not get a straight answer from "ps" since some rootkits replace it with a broken version that shows you only the normal processes. Also, look at your inetd/xinetd configuration and /etc/services to see if anything has been changed. Running "netstat" will give you some of that information. Are your log files intact (no files or lines obviously missing)? Were you running tripwire, and, if so, are the databases backed up? There is a rootkit sniffer that will search for known malicious code on a filesystem; I forget the name but it is documented on www.insecure.org. At some point, when you've seen and documented what you wanted to see about the state of the running system, by all means SHUT IT DOWN unless it is somehow mission critical to let it run. I was "rooted" twice last fall, on both a company server and my home system (using the same vulnerability in ssh-1.x.something, so I felt really stupid). Since then I've learned that a) security compromises are no fun and b) protecting against them is very serious business. I'd like to provide more support, but for confidentiality reasons it might be better to take it off-line until you have cleared this up. Then perhaps you can post a summary to the list. Go ahead and e-mail me directly -- from a system that isn't compromised... :) Truly, Jonathan -- / Jonathan R. Johnson | "Every word of God is flawless." \ | Minnetonka Software, Inc. | -- Proverbs 30:5 | \ [EMAIL PROTECTED] | My own words only speak for me. / -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe https://listman.redhat.com/mailman/listinfo/redhat-list