[vox-tech] lugod.org cracked?

Rick Moen rick at linuxmafia.com
Tue Feb 15 15:39:34 PST 2005


Quoting ME (dugan at passwall.com):

> You will want to down the box and run some integrity checking scripts to
> verify the applications installed are from the packages you have
> installed.

Rod is certainly qualified to choose his own poison, but this is what I
did:

o  Bring down system.  Secure best copy of data files and reference 
   snapshot of /etc.  Double-check that inventories of installed packages, 
   installed-package versions, and "fdisk -l /dev/sd?" output are
   correct and useful.
o  Blow away contents of all hard drives.
o  Recreate minimal system using trusted installation media.  Study
   and adjust security policy.
o  Build up installed packages, as desired.
o  Adjust /etc/passwd, /etc/group, /etc/shadow, /etc/gshadow to add
   back users, but with their access disabled.
o  Copy back user data, except without dotfiles or ~/bin contents.
o  Copy back system data files (e.g., /var/www, /var/mail, /var/news).
o  Recreate system services, with visual reference to prior /etc
   contents, but without reusing any of those files.  (Like all prior
   libs and executables, they are presumed compromised and cannot be
   trusted.)  Regenerate SSH host keys.
o  Re-enable user access, and arrange for their new access without
   honouring any prior security tokens, via out-of-band communication.

I would not recommend to anyone, at any time, that a root-compromised
system merely be "checked" and left running without a rebuild as above.  
That is nothing like a suitable or adequate remedy, in my view.

> Is lugod.org running an file integrity checker?

Some of my thoughts, on that:
http://linuxgazette.net/issue98/moen.html



More information about the vox-tech mailing list