They're not called rootkits for nothing!
Mar. 12th, 2008 11:18 pmCue this shift's stupidity:
- Cust: ZOMFG!!!111!!one!!1!1!eleventy-one!!1 My server is ruined! You host it, it's your fault!
- Me: Er, okay.....
Initial investigation shows both his (un-managed!) servers, co-lo'd in one of our many sites, have been exploited, to the point only a physical console of the machines were the only way in. A quick look around confirms the prognosis: the electronic equivalent of a messy anal rape.
- Me: Your boxen are hosed. I hope you took backups.
- Cust: ...backups??? *insert curious reaction to foreign, unknown word here*
Cue finger-pointing that server security is our fault, despite the fact the customer has no firewall and seems to have neglected setting up any filtering/ACLs on his servers. It took all of five minutes to demonstrate why he was so badly 0wnzed:
[lordstorm@nocjump] ~$ ssh root@you.deserve.to.be.exploited.you.stupid.twat.customer-id.isp.net
Password:
bash-2.05#
Oh look! You've even left ssh open to root-logins! As good as a neon sign advertising the back entrance!
Dipshit. Go away now, you hurt my brain.
- Cust: ZOMFG!!!111!!one!!1!1!eleventy-one!!1 My server is ruined! You host it, it's your fault!
- Me: Er, okay.....
Initial investigation shows both his (un-managed!) servers, co-lo'd in one of our many sites, have been exploited, to the point only a physical console of the machines were the only way in. A quick look around confirms the prognosis: the electronic equivalent of a messy anal rape.
- Me: Your boxen are hosed. I hope you took backups.
- Cust: ...backups??? *insert curious reaction to foreign, unknown word here*
Cue finger-pointing that server security is our fault, despite the fact the customer has no firewall and seems to have neglected setting up any filtering/ACLs on his servers. It took all of five minutes to demonstrate why he was so badly 0wnzed:
[lordstorm@nocjump] ~$ ssh root@you.deserve.to.be.exploited.you.stupid.twat.customer-id.isp.net
Password:
bash-2.05#
Oh look! You've even left ssh open to root-logins! As good as a neon sign advertising the back entrance!
Dipshit. Go away now, you hurt my brain.
no subject
Date: 2008-03-12 11:56 pm (UTC)no subject
Date: 2008-03-13 12:07 am (UTC)Let me alter the post to better convey this!
no subject
Date: 2008-03-13 12:22 am (UTC)no subject
Date: 2008-03-13 12:11 am (UTC)We cheat; we don't _have_ a root password. (Kerberos: each admin has their own individual key, seperate from their main key)
Which does makes watching bad guys attempt to brute-force it funny.
(But only briefly; after a couple tries, the iptables RECENT match spots them and starts bouncing their connection attempts with icmp-admin-prohibited. Hah, die evil brute-force scum-sucking bots.)
no subject
Date: 2008-03-13 05:35 am (UTC)In the oh, damn near 8 years I've been running sub-ether.net, I've been compromised ONCE, and it was from a shite password, which immediately got fixed, AND I got off my lazy ass and turned on the kernel's packet filter. (FreeBSD 4.5's packet filtering sucked when I originally looked at it, which was why I was pleasantly surprised when it took me all of ten minutes and a reboot to turn it on in the version currently running)
And yes, it *IS* fun to watch the bad guys hammer away on SSH, and get Der Boot from the iptables filter.
no subject
Date: 2008-03-13 11:08 am (UTC)No? Oh well...
no subject
Date: 2008-03-13 01:35 am (UTC)So, cringing and vowing SSH would be the first thing we'd put on these boxes, I rlogined into his account. He started to tell me his password, but it wasn't necessary; his own .rhosts file had a + in it, and thus allowed ANYBODY in as him. And from there, to root on any of the servers his group administrated.
I hope they aren't reading this, 'cause they probably think the audit they got from the Information Security team shortly thereafter was a coincidence...
no subject
Date: 2008-03-13 05:36 am (UTC)PLEASE tell me these machines had zero public 'net access.
no subject
Date: 2008-03-13 11:59 am (UTC)no subject
Date: 2008-03-13 06:35 am (UTC)