Eric at Lucii.org on 10 Aug 2012 13:18:41 -0700


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] emerg web server repair


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/09/2012 06:32 PM, bergman@merctech.com wrote:
> In the message dated: Thu, 09 Aug 2012 18:05:55 EDT, The pithy ruminations from Rich Freeman on <Re: [PLUG] emerg web server repair> were: => On Thu, Aug 9, 2012 at 5:55 PM, Paul Jungwirth <once@9stmaryrd.com> wrote: => > I'm a developer, not a sysadmin, so forgive my ignorance: is turning => > aside a DDOS really that easy? I've hear other smart people in IT say => > that there's actually very little you can do, and there are huge sites => > that have suffered extended downtime because of a DDOS attack. => => It is.  In fact there is an even easier solution - just unplug the => network cable. => => The problem with both solutions is that you essentially DOS yourself => to keep out the DDOS.  Maybe if you get them to attack the US
> 
> There's another problem with those "solutions"...the upstream provider continues to receive all the traffic. This can seriously affect your "peers" (ie., other customers of that provider who rely on the same network, same routers, etc.).
> 
> Work with your provider, get them to help out with their firewall or routing.
> 
> http://www.bgpexpert.com/antidos.php https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0CFEQxQEwAg&url=https%3A%2F%2Fdocs.google.com%2Fviewer%3Fa%3Dv%26q%3Dcache%3ANfyPwQ6Pc6YJ%3Awww.nanog.org%2Fmeetings%2Fnanog30%2Fpresentations%2Fmorrow.pdf%2B%26hl%3Den%26gl%3Dus%26pid%3Dbl%26srcid%3DADGEESgZD_-_L8B9QxmaomklVMMA2Jbb2QTRvVzi1v2qj32ZSAg8WNobPKwAizEpZgoC7wymdCerl2-tKCkLymW_sfRauf1O7x3xU73E8IJGaIay4HfG8HD9qEW2Y78AfKGHkBqVYJaP%26sig%3DAHIEtbTtjShXN7hxPAD4uo4sYtJMQCtTqw&ei=2TkkUKyaCcHq0gHD84DYDg&usg=AFQjCNGvXSTJheBZRX6ymMl_c7YUWooRAw&sig2=DMcWm_r_W94yhWyuVvKkpA&cad=rja
> 
> Mark
> 
> 
> => Government somebody else will take care of your problem out-of-band. => => Actually continuing to serve traffic under a DDOS is very difficult indeed. => => Rich


Thanks for all the suggestions and support.
We managed to extricate the last remnants of the evil code and patched the
system about 2:30 this morning.  It's now wrapped up quite tightly and, so
far, we're okay.  We still dread the possibility of a retaliatory DDOS
attack.

A couple of notes:

1. We've started using git as a pseudo intrusion detection method.  The
git repository is owned by root.  Since the hackers only ever gained
access as www-data we feel /reasonably/ safe.  A simple git status tells
us if there are new or modified files.  It's not automatic but rigorous
adherence to source code control protocols will allow us to pin-point
the damaged files MUCH easier should this happen again (God forbid!)

2. Hackers (crackers, whatever) think they are so clever.  The password
for their WSO 2.5 installation was "cocacola".  How do I know?  I went
to a site that has public access to rainbow tables and entered the MD5
value I found in their code.  The answer was nearly instantaneous and
I then owned their tool.  It has now been modified... it looks the same
as before but recognizes NO password whatsoever.  I think I'm so clever.


Eric
- -- 
#  Eric Lucas
#
#                "Oh, I have slipped the surly bond of earth
#                 And danced the skies on laughter-silvered wings...
#                                        -- John Gillespie Magee Jr
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAlAlbLgACgkQ2sGpvXQrZ/5dSgCeJkAZ9xM9amVOhQa0nZWwU2M5
UYgAnjzjPnnSFwYgViF0yGM5ut7JnNE6
=fsMI
-----END PGP SIGNATURE-----
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug