You are not logged in.
I'm basically a Newb,
I ran top yesterday and discovered /user/sbin/httpd was running in several instances started by a guest account. I reviewed the auth.log and found long streams of login attempts with multiple different names. They finally discovered an account that was created without a password I forgot about.
I've removed that account, disabled my ssh port forward. Anything else I should do? Do I report this to the authorities? If so who?
How do I check and see what else they may have done?
Thanks
Tom
Offline
If the access attempts were from the same IP address you can block that IP in httpd, and by configuring your iptables firewall.
http://httpd.apache.org/docs/2.2/howto/access.html
https://wiki.archlinux.org/index.php/Iptables
Last edited by Cyrusm (2014-07-24 15:30:36)
Hofstadter's Law:
It always takes longer than you expect, even when you take into account Hofstadter's Law.
Offline
I'm basically a Newb,
Welcome to Arch Linux.
I ran top yesterday and discovered /user/sbin/httpd was running in several instances started by a guest account. I reviewed the auth.log and found long streams of login attempts with multiple different names. They finally discovered an account that was created without a password I forgot about.
How is your machine attached to the Internet? If you are behind a router on a private LAN, then you had to have opened ports and forwarded them to your machine. One of those would have to have been port 44322 for ssh. HTTP ports would have to be opened separately. Does your router have a password when you access it from your LAN? Is there a password set? If so, an intruder would have a more difficult time making a http server accessible from the Internet.
Also, (This is important) Do you know the port numbers on which those servers were running? I ask, because port numbers below 1024 require root access to open. If an intruder was able to open a privileged port, then that intruder acquired root privileges and you should consider your system to be completely compromised. Had that guest account, the one without a password, been a member of the 'wheel' group?
I've removed that account, disabled my ssh port forward. Anything else I should do? Do I report this to the authorities? If so who?
No. No one is going to care about an intrusion into a home server.
How do I check and see what else they may have done?
You need to determine whether they obtained root privilege. Positive evidence may exist in the logs. Lack of evidence cannot be trusted as the data cold have been tampered. If the account was a member of 'wheel', I would not trust your system. If you are sure they did not attain elevated privilege, you might be okay. Knowing the port numbers would be helpful in making that determination.
If you have a router, audit it for open ports or DMZs. Ensure that you know why and how each one is open.
Edit: Fixed port number for ssh. I had given the port for https
Last edited by ewaller (2014-07-25 14:47:40)
Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
Sometimes it is the people no one can imagine anything of who do the things no one can imagine. -- Alan Turing
---
How to Ask Questions the Smart Way
Offline
They did not get root access as far as I can tell. The port forward was for port 22, which I believe is the default ssh port. The account was in the user group, and it appears they tried to use perl to start httpd, which is not installed on this machine. It appears they used perl to grand start httpd, sys/init was the parent process. .This is a pogoplug I use as an openvpn server/ plex server. BTW, there were multiple IPs, I looked up 2 of them and the were from China.
Thanks for the assistance
Tom
Offline
Assume you are pwned. Nuke from orbit. Chalk it up as a learning experience.
Offline
BTW, there were multiple IPs, I looked up 2 of them and the were from China.
Tom
Imagine that. I average six attacks a day from China on my system.
I agree with Jasonwryan. Reinstall and lock it down
Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
Sometimes it is the people no one can imagine anything of who do the things no one can imagine. -- Alan Turing
---
How to Ask Questions the Smart Way
Offline
Socal Tom wrote:BTW, there were multiple IPs, I looked up 2 of them and the were from China.
TomImagine that. I average six attacks a day from China on my system.
I agree with Jasonwryan. Reinstall and lock it down
Will do, easy enough to do, especially with archlinux arm.
Tom
Offline
Assume you are pwned. Nuke from orbit. Chalk it up as a learning experience.
+1. If the person has access via ssh for example, he/she can reverse tunnel anything out of your box, vnc, http, whatever.
CPU-optimized Linux-ck packages @ Repo-ck • AUR packages • Zsh and other configs
Offline
Based on the OP, can it be concluded that Mr. Tom's mishap occured as a result of a forgotten guest account?
Offline
Based on the OP, can it be concluded that Mr. Tom's mishap occured as a result of a forgotten guest account?
I would say so. Based upon what he wrote, It would appear the shell history file was intact. Either that, or unsuccessful attempts to do things were logged and tagged with the user ID.
Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
Sometimes it is the people no one can imagine anything of who do the things no one can imagine. -- Alan Turing
---
How to Ask Questions the Smart Way
Offline
@ ewaller. It makes sense that guest accounts are typically disabled by default and conscious effort is required to enable them. I did many of the recommendations contained in the "lock it down list", after reading this.
Offline