/srv/irclogs.ubuntu.com/2018/06/10/#ubuntu-server.txt

tomreynTea: maybe the webserver is just not listening on those ports on the ipv6 address(es)?00:17
TeaIt is configured to00:18
tomreyndoes lsof -i :80 confirm it? are you able to connect to your ipv6 address locally?00:19
TeaYes to both00:20
Smokiehey guys, i have a processer running when i run 'top', im trying to find its location on the system but i cannot do that00:45
Smokieusing 'find', 'locate' and 'where' doesnt give me any results, is this normal?00:46
kcufSmokie; the path /proc/<your process pid> has some info on your process if you know your process id - which top tells you02:11
kcufreadlink -f /proc/<pid>/exe02:17
kcufor use htop02:17
=== chamar is now known as Guest24140
=== lifeless_ is now known as lifeless
Smokiehey guys, i have a processer running when i run 'top', im trying to find its location on the system but i cannot do that09:08
Smokieusing 'find', 'locate' and 'where' doesnt give me any results, is this normal?09:08
blackflowSmokie: file /proc/PID/exe         where PID is the PID of the process09:15
blackflowit should be a symlink to the binary that spawned the process09:16
Smokiefound it, thanks09:20
Smokieby killing the process and removing it it shouldnt run again, right?09:21
blackflowSmokie: incorrect. you have to find what started it.09:21
Smokieis there a way to trace how the server got rooted for someone to install it?09:21
blackflowSmokie: if you got pwned, nuke&pave is the only correct solution, unless you want to do forensics on the system.09:21
blackflowSmokie: well, you start with the most obvious. Public facing daemons and their logs. Logs in general. The filesystem inconsistencies (eg. binaries installed from packages that changed checksum or access rights), ...09:22
Smokieblackflow, i have backups and i will wipe the server out, but i'd like to find out how it happened so i make sure its not something im running that gets transferred with the backup09:22
blackflowSmokie: sure. btw, you can't run forensics on the computer itself. Mount the disk elsewhere.09:23
Smokiehard to do that, its a dedicated server running a webserver09:24
Smokieabout 3-4 websites09:24
blackflowif you got wordpress there, chances are that's your intrusion vector.09:24
blackflowmeanwhile, doing anything on the compromised computer is futile. you don't know what else is, and if you can trust the tools. can't trust the checksums, stat, well, pretty much anything.09:25
Smokie3 of the 4 are wordpress actually09:30
=== gotcha is now known as Smokie
Smokieblackflow, thanks for the info.. one last thing,09:37
Smokie29834 ?        Sl   2119327:49 minerd --algo=yescrypt -o stratum+tcp://yescrypt.mine.zpool.ca:6233 -u 1RqhXsVq3vSHXVRyzjswHGhJbXatxvPEf -p x09:37
Smokieblocking the ip/hostname should stop it at least for sending the data, right?09:38
blackflowyes, also port.09:38
Smokiealright09:47
Smokieany other suggestion?09:47
blackflowfor anylists or future?09:48
Smokielets start with the future hehehe09:48
Smokiefor prevention09:48
blackflowSmokie: well you've got plenty of tools. Start with systemd and its security-related options to harden the services.  https://gist.github.com/ageis/f5595e59b1cddb1513d1b425a323db0409:50
blackflowThe build and use AppArmor profiles to confine further, which files can be touched by the service, and in what way (read, write, exec). You most certainly do NOT want write + exec ability, ANYWHERE.09:51
blackflowfirewall outbound packets too. preferably section individual outbound services into separate network namespaces and only allow what's minimally required.09:51
Smokiei assume its safer too to block all ports except whats needed by web, mailserver ?09:53
Smokieyeah09:53
blackflowconsider running services without root privilege. eg. daemons like nginx can be made to. you give them ability to bind to <1000 port with CAP_NET_BIND_SERVICE, and have to be set up and configured not to require uuid change09:53
blackflowSmokie: your webserver has 0 business starting outbound connections. section off the mail server prefereably to a completely separate mchine or VM09:54
Smokiei might consider that if i drop cPanel09:57
Smokieits what i use to manage the server09:57
blackflowsigh... so this ain't Ubuntu, is it?09:57
Smokieoh shit.. this is the cpanel server, it is Not Ubuntu!! my other server is Ubuntu!09:59
blackflowand btw definitely yes. cPanel is a huge mess that you can NOT secure. if oyu try to fire up SELinux (which is the alternative to AppArmor on CentOS), oyu'll break cPanel.09:59
blackflowI'd stay away from cPanel like it's plague. I won't manage one even for monies. refused plenty of gigs like that. Just say no.10:00
Smokiethats good to know, ill take your advice on that, it'll save me money too i guess10:01
Smokiei just thought it would be easier to manage websites and tbh, easier to secure10:01
Smokieand i really totally forgot about it running on centos, i always use ubuntu thats why my head automatically clicked its ubuntu10:02
blackflowyou cannot secure cPanel. it's architected that way from the era where information security was not even a term. its manual starts with "Disable SELinux".10:04
=== rbasak_ is now known as rbasak
pepperheado/16:06
pepperheadNetwork question: Server 18.04. I want to give each of the nic's in my server a staticIP. I see that it is configured in netplan, but the yaml says it wont affect across instances because of cloudinit. Should I disable cloudinit?16:09
pepperheadUnsure what cloudinit is or what it is doing for me16:09
pepperhead<<<< UbuntuServer NOOB16:09
pepperheadMy goal is to play with LXC/LXD to learn the container system16:10
_KaszpiR_pepperhead read about cloudinit, then17:12
_KaszpiR_cloudinit is used to provision (mostly cloud based) systems17:12
pepperhead_KaszpiR_ TBH I am trying to learn Docker/LXC, if I dont need cloudinit, turning it off would save me one more tech to figure out.18:01
_KaszpiR_AFAIR lxc uses cloudinit19:24
_KaszpiR_cloudinit is pretty easy, you should be able to grasp it in 1h19:24
_KaszpiR_also it's optional, if you don't do anything then by default it does nothing19:25
pepperheadKaszpiR Thanks. I think what I need to do is configure the four ports, and "bind" to one of them for my host. I think LXC will take ownership of each as they are bound within the container. Researching "binding" now. Thanks again.20:55

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!