Re: [CentOS] Hacking Issue

2011-09-27 Thread Micky L Martin
On Mon, Sep 26, 2011 at 10:10 AM, m.r...@5-cent.us wrote:

 Theo Band wrote:
  On 09/26/2011 01:02 PM, Jennifer Botten wrote:
 
  I am having an issue with someone accessing our server via a SIP/VOIP
  connection. I have changed my iptables rules to drop all UDP traffic
  from and too this IP address, but this traffic seems to still run
  through my server. These are the iptables rules that I current have on
  the server.
 
  -A INPUT -i eth0 -s 209.61.231.42 -p udp -j DROP
 
  -A INPUT -i eth0 -d 209.61.231.42 -p udp -j DROP
 
 
  If your SIP server needs to be accessed from any IP address, consider to
  use fail2ban. Easy to setup and it will block access to your SIP server
  after so many false attempts.
  I started using fail2ban to prevent the logs (Asterisk) from cluttering
  failed logons.

 Let me chime in: *yes* to fail2ban. We use it here at work, and it works,
 and is very good. Not too hard to configure for basic usage, either, but
 very extensible.

 mark



I use CSF and LFD. Like every other firewall, the backend is always iptables
but CSF is so powerful and has a lot of irreplaceable power and
functionality.
It can be a bit of difficult to configure it for the first time but when you
do, you will never look back ;)

-Micky.
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


[CentOS] Files being modified in /bin/

2011-09-26 Thread Micky L Martin
For the binary experts.

I have a situation here. Something hideously but continuously is modifying
the /bin/ executables as common as coreutils and net-tools.
I can verify that from md5sum. First thing I checked was 'ls' and it has a
checksum mismatch. So I removed it and reinstalled it. Then I moved the file
somewhere else to cross bisect it.

I did a hexdump on original ls file and the modified file, and there was
some 700 lines of hex code additional in the modified file.
Then I set a cron to check and do md5sum on all system files and after half
an hour, I go a report back. Files modified.

This time when checked the hex dump of newly and earlier modified files,
they were the same. Exact same!

Because rpm and rpmverify also seemed to have been modified so I cannot
trust 'rpm -V' package verification.

Already did lsof and process tracing but to no avail. Does anyone have any
idea how to find that culprit?


-Micky.
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Files being modified in /bin/

2011-09-26 Thread Micky L Martin
So apparently prelink was running.
I disabled it in /etc/sysconfig/prelink and ran 'prelink -ua' to undo the
linking.

I just stumbled upon a document (attached) describing how Linux used to have
a.out  http://en.wikipedia.org/wiki/A.out and now the ELF.

Though I never knew that prelink actually modifies the files and thought of
it as a cache library or something. Literally modifies!!

So, I assume the problem is solved as ls seems to have reverted back but if
not then it may be an LKM kit :|






On Mon, Sep 26, 2011 at 6:29 AM, Rob Kampen rkam...@kampensonline.comwrote:

 Jeremy Sanders wrote:

 Micky L Martin wrote:



 Because rpm and rpmverify also seemed to have been modified so I cannot
 trust 'rpm -V' package verification.

 Already did lsof and process tracing but to no avail. Does anyone have
 any
 idea how to find that culprit?



 Are you sure it's not prelink that's modifying the files? You can google
 how to disable this.


 Any comments or thoughts from the list as to the benefit of prelink?
 does the system performance change if this is disabled?
 It causes issues with aide also.

  Boot from a CD to check the checksums or run rpm if you want a clean
 environment.

 Jeremy


 __**_
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/**mailman/listinfo/centoshttp://lists.centos.org/mailman/listinfo/centos



 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos


___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Problems with Intel Ethernet and module e1000e

2011-09-26 Thread Micky L Martin
In our case, it was the driver.
Google e1000e-1.6.2.tar.gz


On Mon, Sep 26, 2011 at 6:56 AM, m.r...@5-cent.us wrote:

 Patrick Lists wrote:
  On 09/23/2011 12:54 PM, Volker Poplawski wrote:
  Hi all,
 
  I'm facing a serious problem with the e100e kernel module for Intel
  82574L gigabit nics on Centos 6.
 
  I have also had problems with an Intel Gbit nic in a Dell Optiplex 760
  using the e1000 module. If it would come up it would come up at 100Mbit
  speed. Only unplugging the LAN cable en reinserting it in the switch
  would sometimes result in the proper 1Gb speed. After replacing the 3Com
  Gbit switch with a DLink Gbit switch things started to work ok.
 
  As suggested, you could try out the e1000 kernel module form elrepo (if
  it works, good for you) but you may want to look into the switch too.

 Hmmm, we had a problem like that, but in our case, it was the NIC. If
 someone's already asked this - I didn't read the list over the weekend -
 ignore the request, but if not, while it's not working, what's the o/p of
 ethtool ethwhatever

mark

 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos

___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Files being modified in /bin/

2011-09-26 Thread Micky L Martin
No Jeremy, reformatting is nonsensical, like doing anything without finding
cause of the problem is!
You have to check out prelink if you still don't know about it, it can be
something amazing or ridiculous.
In my case, all evidence points to prelink!


To the guys using prelink and having experience with it.
So I did a further study and found out that it possesses some issues.

First it doesn't randomly address the data making applications prone to perl
security attacks. Secondly, it way of keeping track of address maps is
awkward which becomes a few weeks older till it gets updated.
Thirdly, its 'a very old styled' application. It was written back in 90's
when computers were slow to make them fast. But with today's extraneous
processing age, its effects are long vanishing.
Lastly, I see a lot of people remove it in post installation process. Many
claim it sucks as it creates more problems than what it is supposed to do.

As I occasionally do a minimal install so I am not sure how it got installed
on this very box. Seems like 'yum update' or the kickstart did it.
But anyhow I disabled it already and I am gonna benchmark the system for
performance; needless to day, it will be removed from my desk.

It did pop like a jack in a box :P!








On Mon, Sep 26, 2011 at 7:11 AM, m.r...@5-cent.us wrote:

 Jeremy Sanders wrote:
  Micky L Martin wrote:
 
  Because rpm and rpmverify also seemed to have been modified so I cannot
  trust 'rpm -V' package verification.
 
  Already did lsof and process tracing but to no avail. Does anyone have
  any idea how to find that culprit?
 
  Are you sure it's not prelink that's modifying the files? You can google
  how to disable this.
 
  Boot from a CD to check the checksums or run rpm if you want a clean
  environment.

 Don't really know about prelink, but I strongly agree with the last
 suggestion: boot from a CD, or USB key, or something *other* than your
 hard drive - your comments strongly suggest that you've been infected. You
 *do* have backups of your configuration and data (and home directories,
 etc)? If so, you might want to do a reinstall without formatting... and
 then, and only then, rerun grub-install.

  mark

 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos

___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Hacking Issue

2011-09-26 Thread Micky L Martin
I would use an '-I' instead of '-A' if its a case of blocking an intruder.

You can use tcpdump and 'ss -l' as well.

Check out the application logs, try to see what's the intruder is up to!




On Mon, Sep 26, 2011 at 7:14 AM, Keith Roberts ke...@karsites.net wrote:

 On Mon, 26 Sep 2011, Jennifer Botten wrote:

  To: centos@centos.org
  From: Jennifer Botten jenni...@etech.co.za
  Subject: [CentOS] Hacking Issue
 
  Hi,
 
 
 
  I am having an issue with someone accessing our server via a SIP/VOIP
  connection. I have changed my iptables rules to drop all UDP traffic from
  and too this IP address, but this traffic seems to still run through my
  server. These are the iptables rules that I current have on the server.
 
  -A INPUT -i eth0 -s 209.61.231.42 -p udp -j DROP
 
  -A INPUT -i eth0 -d 209.61.231.42 -p udp -j DROP

 You might find it helps to analyse this traffic with a
 network analyser, like Wireshark. That would allow you to
 see in almost real time what is happening on the line.

 Kind Regards,

 Keith Roberts

 -
 Websites:
 http://www.karsites.net
 http://www.php-debuggers.net
 http://www.raised-from-the-dead.org.uk

 All email addresses are challenge-response protected with
 TMDA [http://tmda.net]
 -
 ___
 CentOS mailing list
 CentOS@centos.org
 http://lists.centos.org/mailman/listinfo/centos

___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos