/srv/irclogs.ubuntu.com/2009/04/12/#ubuntu-server.txt

jdstrandScottK: big thanks for taking care of 0.95.1 :)00:14
ScottKjdstrand: Thanks.  Glad I could find the time to squeeze it in.00:14
jdstrandScottK: I actually added the CVEs to our tracker when they came through last week, and updated the USN00:14
jdstrand(but yeah, not in the changelog)00:15
ScottKjdstrand: OK.  There's one or two more from 0.95.1.00:15
* jdstrand nods00:16
jdstrandI'll get to those next week00:17
ScottKjdstrand: One of the Debian guys is going to have a look at it tomorrow, so I may have something before then.00:18
jdstrandah, great :)00:34
Polk`!hammertime02:50
ubottuSorry, I don't know anything about hammertime02:50
=== kraut_ is now known as kraut
=== tonyyaru1so is now known as tonyyarusso
=== ScottK2 is now known as ScottK
=== twb` is now known as twb
cemcis there a way to install exim without removing postfix ?06:15
cemcwhen I do an apt-get install exim, it automatically wants to remove postfix, but I'd like to keep postfix on too06:15
lamontcemc: that is according to policy.  you get at most one MTA06:16
cemcI see. no way around that?06:17
lamontit would violate policy if you could.  so that'd be a "no, you can't do that"06:17
lamontof course, you could run the other inside of a VM or even a chroot, but then you get to decide which one listens on port 25, and which one fails06:17
cemcgot it06:19
ScottKThe one true answer is you really want to keep postfix.06:23
ScottK;-)06:23
cemcI know that :)06:25
cemcjust wanted to do some exim testing, without removing postfix06:25
cemcbut I guess it only removes the package, not the config, so it's good06:25
cemcpolicy is kinda strange tho :) why can't I have more than one MTAs if I can handle the conf, or I have multiple IPs, or whatever06:26
lamontcemc: tell me how you'll have more than one daemon listening on port 25, and I'll tell you how to have policy allow multiple MTAs (oh, and make /usr/sbin/sendmail point to both MTAs while  you're at it)06:28
ScottKMultiple IPs could solve the port 25 problem, but not sendmail.06:28
lamontyeah06:28
cemcyou have sendmail.postfix and sendmail.exim, and you have sendmail pointing to one or the other, like with alternatives ?06:29
lamontcemc: yeah - except for the part where debian policy says that the MTA will provides/conflicts/replaces: mail-transport-agent06:30
cemcehe :)06:30
cemctoo bad, but no biggie ;)06:31
cemcdid I say something wrong? :))06:35
* |Sigma| waves08:42
|Sigma|is there any way to setup a VPN server so only a certain subnet gets routed through it, and everything else gets routed to a DNS server?08:45
twbThat would be called setting up a routing table08:56
twbYes, you an do it.08:56
twb*can08:57
|Sigma|great, routing table, thanks for the key word, I've been trying to figure this out for a while08:58
|Sigma|so in this case, I could get away with setting up the table on the vpn server and then setting up the clients to send all traffic through the VPN, correct?09:00
=== asac_ is now known as asac
twbCan I remotely drop a machine into single user mode and straight back out again?10:39
twbls /proc/NNNN/ hangs, and similar problems with the process table, but I don't want to drive out there and do a hard reboot.  A soft reboot doesn't work, it just ignored my "shutdown -r now"10:39
bootsandallI'm a bit new to linux, but I guess you could set up a cron job to bring it back to multi user mode in 5 minutes?10:52
=== maxb_ is now known as maxb
twbbootsandall: assuming that atd/crond aren't stopped as part of the single-user shutdown :-)11:21
twbAs it happens, "telinit 1" is ignored just like shutdown (which amounts to telinit 0).11:21
twbI would like to blame upstart for this, but honestly it's more likely to be the mangling that openvz has done to the kernel's innars.11:22
twb*innards11:22
=== apachelogger_ is now known as apachelogger
=== MenZa_ is now known as MenZa
=== jdstrand_ is now known as jdstrand
ZipmaO^Hi19:27
ZipmaO^Is there some way to track a user accounts shell command history?19:27
ZipmaO^I have e useracc that I used for samba and therefore had a trivial password. The account was hacked from ssh and now I want to know what they did19:28
ropetinZipmaO^: they probably covered their tracks, but what about the .bash_history file in their home directory?19:34
ZipmaO^the account had /bin/sh shell at the moment19:35
ZipmaO^non-19:35
ropetinSo as far as I know, no, there is no way to get a list of their commands19:35
ZipmaO^and was not admin19:35
ZipmaO^ok19:35
ZipmaO^can i search for files with a specific ownership?19:36
ZipmaO^I found files that I think they created in /var/tmp/.www/19:36
cemcZipmaO^: try 'man find', and search for -uid, -user19:36
ropetinyup, find would be good, combined with grep19:36
ZipmaO^ok, really thanks for the help19:37
cemcsomething along the lines of: find . -user 'foo' (find all the files with owner foo in the current directory and below, aka recursive)19:37
cemcwell this actually will find directories too, see -type19:38
ZipmaO^I didn't mind much when I noticed that someone logged in as the account when I ran "lastlog"19:38
ZipmaO^so I changed the shell then to /bin/false to prevent it again19:38
ZipmaO^But earlier today I noticed in syslog that somekind of cron-job was running every minute19:38
cemcoops :) sounds like you got hacked, or something ;019:39
ZipmaO^found it in the hacked accounts crontab and it led me to /var/tmp/.www/19:39
ZipmaO^yep..19:39
ZipmaO^well the accound had the same name as passwd19:39
ZipmaO^Kinda scary but I guess I don't have to worry that much since the acc isn't in the sudoers list?19:42
cemcweell...19:45
cemcyou _really_ want to check everything, you never know19:45
yann2ZipmaO^ > check /tmp, often stuff in there :)19:47
ZipmaO^ok, will do :)19:50
ZipmaO^Thanks for the help guys19:50
cjwatsonZipmaO^: unfortunately, local root escalation is one of the more common categories of vulnerabilities, so I'd second the suggestion to check everything very carefully indeed20:23
ZipmaOCjwatson, I don't really understand the term "local root escalation" ?21:07
andolZipmaO: Basically a vulnerability which allows a local non-root user to gain root status. It doesn't have to be a regular user, it can also be a system user, running one of your daemons.21:11
ZipmaOhow would that be possible?21:12
ZipmaOOr more important: what to check?21:13
=== MianoSM1 is now known as mianosm1
=== mianosm1 is now known as MianoSM1
ZipmaOadmin group, sudoers list, user shells?21:13
ZipmaOrunning daemons processes?21:13
=== jussi01 is now known as android
=== android is now known as jussi01
ZipmaOnoone?21:49
mattthello21:51
matttwhat's the question21:52
cemcZipmaO: that's the problem... what to check... if there was an exploit and the hacker gained root access, he could've hid a backdoor, or something bad like anywhere...21:53
ZipmaOok.21:54
ZipmaOI see21:54
cemcthe smartest thing to do is probably a clean install,21:54
cemcbut if not... you have check everything21:54
ZipmaOprobably less efficient21:54
ZipmaOI don't have that much configuration on the server21:54
cemcnot sure how is it done on ubuntu, but on redhat I did a rpm -Va, that checked every rpm installed,21:54
cemcevery package for changes, then I went over the list of changes etc21:55
cemccheck crontab, check stuff in /etc, users, change passwords, firewall ssh, let nobody in ;)21:55
ZipmaO I just ran "sudo find / -ignore_readdir_race -user *****"21:55
ZipmaOjust the files that I talked about earlier /var/tmp/.www/21:56
ZipmaOseemed like a script hack that installed an IRC-bot21:56
cemcmhm21:57
matttZipmaO: what was the file ownership of those files?21:57
cemcprobably apache21:57
cemc;)21:57
matttyeah :)  check for mambo/phpbb/etc.21:57
ZipmaOall the files in that folder matched ownership of the username21:57
ZipmaOfound some more files now..22:25
ZipmaO/proc/530322:25
ZipmaOwhat are those folders used for?22:25
cemcproc/<pid>/ contains info about that process which is running and has that process ID22:27
cemcdo a ps ax |grep 530322:27
cemcand you'll see what process that is22:27
cemcbetter yet, do 'ps axu |grep 5303', so you can see the user the process is running as22:28
=== andresmujica2 is now known as andresmujica
ZipmaOok22:49
ZipmaOthanks cmec22:49
ZipmaOthe hacked user owns that catalouge22:49
ZipmaOroot      5303  3.0  0.2  13680  4860 ?        S    22:19   2:43 /usr/sbin/smbd -D22:50
ZipmaODoesn't seem weird since it's a samba user22:50
ZipmaO?22:50
cemcwhat did you find in /proc/5303 exactly22:51
ZipmaOsec..22:51
ZipmaOwell.. quite many folders and files22:54
ZipmaOweird thing though, ran the find command again22:54
ZipmaOand didn't report any files under /proc this time22:54
ZipmaOWell well..23:01
ZipmaOGuess I'll do an reinstall asap23:01
ZipmaOjust to be sure..23:02
cemcyep, that's probably the best thing23:03
=== asac_ is now known as asac

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!