Re: rc.local mystery executables

2014-08-30 Thread Joel Rees
2014/08/30 12:20 Eric Furman ericfur...@fastmail.net: grc.*** (because I don't want any more googgle weight given to this website) and the person who runs it, whose name shall not be mentioned other than his initials are SG, is a complete fraud. The first two paragraphs didn't seem too bad.

Re: rc.local mystery executables

2014-08-29 Thread Scott Bonds
On Tue, Aug 19, 2014 at 03:24:08AM -0400, Todd Zimmermann wrote: Just off the top my head a few links: www.team-cymru.org https://www.dshield.org http://emergingthreats.net/ https://www.grc.com/dns/dns.htm I stumbled upon malheur awhile back. No idea what to do with it, but it compiles

Re: rc.local mystery executables

2014-08-29 Thread Eric Furman
grc.*** (because I don't want any more googgle weight given to this website) and the person who runs it, whose name shall not be mentioned other than his initials are SG, is a complete fraud. On Fri, Aug 29, 2014, at 08:37 PM, Scott Bonds wrote: On Tue, Aug 19, 2014 at 03:24:08AM -0400, Todd

Re: rc.local mystery executables

2014-08-19 Thread Henning Brauer
* Scott Bonds sc...@ggr.com [2014-08-19 02:28]: The funny thing is that I have a book on Snort on my reading list. Time to read it. or you use the time for something useful instead. did I say snake oil? ewps. -- Henning Brauer, h...@bsws.de, henn...@openbsd.org BS Web Services GmbH,

Re: rc.local mystery executables

2014-08-19 Thread Todd Zimmermann
OpenBSD has always rocked for providing very current versions of snort. barnyard2 compiles cleanly on obsd. The funny thing is that I have a book on Snort on my reading list. Time to read it. I'll checkout barnyard2 as well There is a learning curve for sure. It's not something that most can

Re: rc.local mystery executables

2014-08-19 Thread Stuart Henderson
On 2014-08-15, Scott Bonds sc...@ggr.com wrote: I thought I was being reasonably careful: ssh disabled for root, key-only login on my admin account, following stable, etc...then again, I'm running owncloud and a bunch of other (no doubt less secure) software. Perhaps I should separate the

Re: rc.local mystery executables

2014-08-19 Thread Cristiano Deana
On Fri, Aug 15, 2014 at 5:53 PM, Josh Grosse j...@jggimi.homeip.net wrote: On 2014-08-15 10:39, Scott Bonds wrote: ...I'm running owncloud and a bunch of other (no doubt less secure) software On June 29, there was a 5.5-stable update to www/owncloud to release 6.0.4 to fix a security

Re: rc.local mystery executables

2014-08-18 Thread ej
On 16-08-14 08:22, Joel Rees wrote: On Fri, Aug 15, 2014 at 11:39 PM, Scott Bonds sc...@ggr.com wrote: [...] Perhaps I should separate the router and 'everything else' roles, so that the router only has builtin OpenBSD software on it, no packages. Strongly encourage you to get a separate box

Re: rc.local mystery executables

2014-08-18 Thread Scott Bonds
On Sat, Aug 16, 2014 at 02:34:21AM -0400, Todd Zimmermann wrote: Lots of good stuff in base and the ports collection. mtree can be extended to check file integrity for anything you've modified and other local stuff (something I need to do). thanks, mtree is neat, glad to know about it

Re: rc.local mystery executables

2014-08-16 Thread Joel Rees
On Sat, Aug 16, 2014 at 1:52 AM, Scott Bonds sc...@ggr.com wrote: On Fri, Aug 15, 2014 at 10:50:55AM -0500, Adam Thompson wrote: While a long way from perfect, tools such as chkrootkit and rkhunter might shed some light on your situation. As Giancarlo said, check every machine that's closely

Re: rc.local mystery executables

2014-08-16 Thread Joel Rees
On Fri, Aug 15, 2014 at 11:39 PM, Scott Bonds sc...@ggr.com wrote: [...] Perhaps I should separate the router and 'everything else' roles, so that the router only has builtin OpenBSD software on it, no packages. Strongly encourage you to get a separate box to run the router and firewall on.

Re: rc.local mystery executables

2014-08-16 Thread Todd Zimmermann
Yeah it sucks, the miscreants run 24/7 365. My guess is home systems are targeted a lot because there's only an 'IT Dept' of one. Lots of good stuff in base and the ports collection. mtree can be extended to check file integrity for anything you've modified and other local stuff (something I need

Re: rc.local mystery executables

2014-08-16 Thread Ted Unangst
On Sat, Aug 16, 2014 at 15:22, Joel Rees wrote: On Fri, Aug 15, 2014 at 11:39 PM, Scott Bonds sc...@ggr.com wrote: [...] Perhaps I should separate the router and 'everything else' roles, so that the router only has builtin OpenBSD software on it, no packages. Strongly encourage you to get

Re: rc.local mystery executables

2014-08-15 Thread Scott Bonds
Ok, thanks for confirming (and Chris and Adam). And while I have you here, thank you for all of your contributions to OpenBSD, its amazing to me the scope and quality of what y'all have built. I thought I was being reasonably careful: ssh disabled for root, key-only login on my admin account,

Re: rc.local mystery executables

2014-08-15 Thread Giancarlo Razzolini
On 15-08-2014 11:39, Scott Bonds wrote: I thought I was being reasonably careful: ssh disabled for root, key-only login on my admin account, following stable, etc...then again, I'm running owncloud and a bunch of other (no doubt less secure) software. Perhaps I should separate the router and

Re: rc.local mystery executables

2014-08-15 Thread Scott Bonds
On Fri, Aug 15, 2014 at 11:42:32AM -0300, Giancarlo Razzolini wrote: Don't forget to check your own machine, not just your OpenBSD server. It's more often than not the point of origin of the attack. If your machine is compromised, reinstalling your server won't do anything, since they'll

Re: rc.local mystery executables

2014-08-15 Thread Adam Thompson
On 14-08-15 10:01 AM, Scott Bonds wrote: I'm running OpenBSD 5.5-stable on my laptop as well. My laptop isn't running any public services AFAIK...I've configured the ones I'm running on it (like unbound) to only respond to local requests. Then again, I haven't tested those ports from another

Re: rc.local mystery executables

2014-08-15 Thread Josh Grosse
On 2014-08-15 10:39, Scott Bonds wrote: ...I'm running owncloud and a bunch of other (no doubt less secure) software On June 29, there was a 5.5-stable update to www/owncloud to release 6.0.4 to fix a security issue. If you are looking for possible attack surfaces, this may have been

Re: rc.local mystery executables

2014-08-15 Thread Mihai Popescu
On June 29, there was a 5.5-stable update to www/owncloud to release 6.0.4 to fix a security issue. The developers annoucement, from the webpage for this thingie ( i don't know what the hell this software is doing): -- Yeah, you were screwed!

Re: rc.local mystery executables

2014-08-15 Thread Scott Bonds
On Fri, Aug 15, 2014 at 10:50:55AM -0500, Adam Thompson wrote: While a long way from perfect, tools such as chkrootkit and rkhunter might shed some light on your situation. As Giancarlo said, check every machine that's closely interconnected, not just the one compromised server you've noticed.

Re: [Bulk] Re: rc.local mystery executables

2014-08-15 Thread Kevin Chadwick
previously on this list Scott Bonds contributed: I'm running OpenBSD 5.5-stable on my laptop as well. My laptop isn't running any public services AFAIK...I've configured the ones I'm running on it (like unbound) to only respond to local requests. Then again, I haven't tested those ports

Re: rc.local mystery executables

2014-08-15 Thread Josh Grosse
On 2014-08-15 12:38, Mihai Popescu wrote: On June 29, there was a 5.5-stable update to www/owncloud to release 6.0.4 to fix a security issue. The developers annoucement, from the webpage for this thingie ( i don't know what the hell this software is doing): -- Yeah, you were

Re: rc.local mystery executables

2014-08-15 Thread Stuart McMurray
Before I blocked all of China, I saw something very similar on an ssh honeypot I run. Every few hours or so, I'd get the following: http://sprunge.us/OGfE Seemed totally automated. J. Stuart McMurray On Fri, Aug 15, 2014 at 1:51 PM, Josh Grosse j...@jggimi.homeip.net wrote: On 2014-08-15

rc.local mystery executables

2014-08-14 Thread Scott Bonds
I run an OpenBSD 5.5-stable amd64 server at home. Email, web, etc. Today I was doing some maintenance and I found my way to /etc/rc.local. When I opened it I saw this: $ cat rc.local # $OpenBSD: rc.local,v 1.44 2011/04/22 06:08:14 ajacoutot Exp $ # Site-specific startup actions, daemons,

Re: rc.local mystery executables

2014-08-14 Thread Chris Cappuccio
Scott Bonds [sc...@ggr.com] wrote: I run an OpenBSD 5.5-stable amd64 server at home. Email, web, etc. Today ... $ file dsfrefr dsfrefr: ELF 32-bit LSB executable, Intel 80386, version ... So...have I been p0wned or does anyone know what innocent thing might be happening here? Please CC

Re: rc.local mystery executables

2014-08-14 Thread Adam Thompson
On 14-08-14 07:54 PM, Scott Bonds wrote: So...have I been p0wned or does anyone know what innocent thing might be happening here? I think you already know the answer, unless you've done something very, very strange back in April. However, it could be said that the 3rd party here isn't

Re: rc.local mystery executables

2014-08-14 Thread Ted Unangst
On Thu, Aug 14, 2014 at 17:54, Scott Bonds wrote: So...have I been p0wned or does anyone know what innocent thing might be happening here? Please CC sc...@ggr.com on any replies, as I'm not subscribed to updates from the list. Bad news: yeah. They appear to have screwed up their rootkit by