solarbird: (molly-angry)
[personal profile] solarbird
Our main mail/web server, lodestone, got rootkitted last night. Unless I've missed a security bulletin recently - which I could well have, given how things have been - it was probably a local exploit via a stolen user account. However, that's not guaranteed. (I have some suspicions about where to look; I saw a login yesterday that somewhat surprised me, but not enough for me to be alarmed. That was probably a mistake.) The rootkitting happened last night, mostly around midnight PDT.

The box has been fundamentally compromised; in addition to widespread webspace hacking, /bin and files in it have been changed. The box will need to be flattened and rebuilt. Unfortunately, this work cannot really begin until [livejournal.com profile] annathepiper gets back. We are also in the middle of trying to move, making things much more difficult.

Assume we will be down for AT LEAST four days, probably longer. During this time, our net connectivity will probably be intermittant. I may be able to get a skeleton box online to catch incoming mail before then, but no promises.

When lodestone comes back up, we will be requiring new passwords from ALL users. ALL executable files in userspace should be deleted, and either recompiled or reinstalled. These were not expert crackers; the work was sloppy; they left fingerprints everywhere, and some of their attempts to modify binaries resulted in nonexecutable files, rather than trojaned files, which is good. But that doesn't mean they were totally inept. And they were certainly trying to do as much damage and backdooring as possible, so we need to react as if they were better than they are.

If there are any former Murknet admins who think they can help/do something useful/provide advice, let me know.

Date: 2004-07-24 12:10 pm (UTC)
From: [identity profile] mamishka.livejournal.com
Is it possible that we can rebuild from a backup and just change all the passwords, or am I just a big dummy that doesn't understand that that won't work?

Date: 2004-07-24 12:14 pm (UTC)
From: [identity profile] lyonesse.livejournal.com
there are two reasons one usually rebuilds in cases like this:

first, people don't usually back up the "system" files -- like the programs you run and stuff, which are what live in /bin -- just people's own data. but since dar knows that stuff like that has been changed, it would need to be replaced, and may not have been backed up. since she's asking people to reinstall/recompile, my guess is that some system libraries have been changed as well. it's safer to just thoroughly clean out if you are uncertain of (a) the extent of the damage and (b) the exact time of the compromise, and know you have a clean backup from before it.

second, if you don't know how the crackers got in, there may be a security hole in your system that you don't know about. in which case updating the entire system is the right thing to do.

Date: 2004-07-24 12:42 pm (UTC)
From: [identity profile] mamishka.livejournal.com
Okay, so there is the rebuild, but can we still get data from the backups and input it, or is it potentially risky? I wouldn't think so, but then again I'm not a computer person. I hate feeling this stupid and useless. I want to help and I can't. :(

Date: 2004-07-24 01:10 pm (UTC)
From: [identity profile] lyonesse.livejournal.com
anything like text or html is absolutely fine and can be restored from backups. though you'll want to check and see if they still say what you wanted them to say :) it's only executables -- runnable programs -- that you would not want to restore. for such things you would want to reread the code, see that it has not been tampered with, and rebuild it into a computer executable.

don't fret that you don't happen to be a sysadmin. i work with BRAIN SCIENTISTS!! -- and very very very few have the least idea how to administer computers :)

Date: 2004-07-24 10:04 pm (UTC)
annathepiper: (Default)
From: [personal profile] annathepiper
I have semi-recent backups on tape--this will help us most likely rebuild most of the most active web pages, since a lot of the web page data we have on the system doesn't change very quickly. So at least in that respect we should be okay. I will be touching bases with Dara as well to evaluate the status of the rest of the user account files on the system so that we can determine exactly what got fucked up and what didn't.

The more worrisome part of this is the operating system itself. :( As Vicka has posted, it will be most secure for us to flatten the box, start from scratch, and make damn sure that we have all the latest security updates before we go live again.

And people bitch at Windows boxes for these problems. :P GAH!

(My own personal worry re: user data is going to be the huge mysql databases that power both my web pages--the personal one and the Two Moons one. If I can't get that back online and have to retype all that in, I will be EXTREMELY pissed. :P )

Date: 2004-07-24 12:10 pm (UTC)
From: [identity profile] lyonesse.livejournal.com
who/where was the unusual login?

my work site got hacked last week; if it was my account then i probably have more cruft to clean up at work :/

Date: 2004-07-24 12:18 pm (UTC)
From: [identity profile] smeehrrr.livejournal.com
If you want, I can set up secondary MX for you here. You won't be able to access your mail until your server is back up, but I can queue it up for you so it won't bounce.

Although it looks like you don't actually have any working DNS either, so that probably won't help.

Date: 2004-07-24 04:46 pm (UTC)
ext_24913: (Default)
From: [identity profile] cow.livejournal.com
I'm not involved in murknet, but I'm a systems administrator and have experience running both my own and other peoples' boxes. If I can be of any assistance, don't hesitate to ask. :)

Date: 2004-07-24 07:09 pm (UTC)
ext_24913: (Default)
From: [identity profile] cow.livejournal.com
I believe it's Applications -> Utilities -> Disk Utility. You should be able to drag the ISO into the main program, and then burn it to a CD-ROM.

I've never tried this, however, as my OS X box doesn't have a burner. But it should do it.

(this is Panther -- 10.3. Your mileage may otherwise vary, but I'm pretty sure it's been that same program back to 10.0.)

Date: 2004-07-24 11:26 pm (UTC)
ext_24913: (priest)
From: [identity profile] cow.livejournal.com
*bows* Glad to be of service. :)

Date: 2004-07-25 09:00 pm (UTC)
From: (Anonymous)
Mrr, Disk Utility - NOT disk copy - in OS X back at least to 10.1 should have an eject button. In OS X (panther) it's one of the blue ones at the top. This assumes you can select the drive with the coaster in it. You don't have to select the coaster - trying to eject the drive will have the desired effect. (meaning, it will not attempt to spit the drive across your living room...)

Failing that, there are paper clips. Does your CD tray have a tiny hole anywhere? It may be hidden under the faceplate. If the OS doesn't know it has a CD, it won't hurt it to remove the coaster without it ever knowing otherwise. :)

Date: 2004-07-25 08:19 am (UTC)
From: [identity profile] backrubbear.livejournal.com
A paranoid sysadmin friend recommends the following:

http://www.grsecurity.net/

January 2026

S M T W T F S
    1 23
4 56 7 8 910
1112 131415 1617
1819202122 2324
25262728293031

Most Popular Tags