<quote who="Tim White">
> Reports indicate that the Apache/mod_ssl worm's source code is placed
> in /tmp/.bugtraq.c on infected systems. It is compiled with gcc,
> resulting in the executable binary being stored at /tmp/.bugtraq;
> therefore, presence of any of the following files on Linux systems
> running Apache with OpenSSL is indicative of compromise.
I've taken a bit of stick every now and then for refusing to let co-admins
install gcc and other non-server-related software on machines that I admin.
Giving gcc to a worm or human attacker is like arming them with an anti-
aircraft missile in an inner city cafeteria.
"But what if I have to build a kernel?" -> you can do it on *any* other
machine, even cross-compiling it on a different architecture if you're
feeling lucky
"But what if I have to rebuild a patched package?" -> do it on your test
system which should be exactly like your production machine anyway
"But it's convenient!" -> go to the back of the class
If you can, it's even worth removing perl, bash (/dev/tcp!), and other tools
from machines that you're paranoid about. Don't give a worm or human
attacker *any* rope to hang you on. This worm can be extra sneaky given that
it can compile itself, but don't discount the damage that a perl or python
based worm could do before detection.
[ Unfortunately, I can't do that with my distribution, but I hope the day
will come when I can. It would be cool if other distributions greyed out
the 'development' tools option once you select 'server' too, though
perhaps that's a bit harsh. :-) ]
Numero Uno: Don't put any crap, compiler or not, on your server that you
don't need. It can and will be used against you.
- Jeff
--
The Unix Way: Everything is a file.
The Linux Way: Everything is a filesystem.
--
SLUG - Sydney Linux User's Group - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug