/srv/irclogs.ubuntu.com/2019/08/03/#ubuntu-discuss.txt

lotuspsychjegood morning to all01:18
sarnoldmorning lotuspsychje :)01:20
lotuspsychjehey sarnold01:20
lotuspsychjereboot after kernel first :p01:21
sarnoldtomreyn: jfyi :) https://lists.ubuntu.com/archives/ubuntu-release/2019-August/004788.html01:22
tomreynsarnold: thanks ;) i noticed it posted earlier in -release01:25
sarnoldwoot01:25
tomreyni'm already testing live-server01:26
sarnoldhahaha01:26
sarnoldawesome :D thanks01:26
tomreyn2 bugs so far, but nothing serious01:26
lotuspsychjemorning tomreyn01:27
tomreyngood middle of the night, lotuspsychje01:27
tomreynor morning, whichever you prefer :)01:27
sarnoldgood "I hope your air isn't still on fire"01:27
lotuspsychjehehe01:28
* tomreyn waiting for 20 snaps to be installed after first boot (which were selected to be installed during installation)01:43
lotuspsychjeuh-oh, more affects on my bug #183864401:43
ubot5bug 1838644 in linux-hwe (Ubuntu) "Booting into desktop results in flickering" [Undecided,Incomplete] https://launchpad.net/bugs/183864401:43
tomreyncarl fletcher also has a clevo01:49
lotuspsychjeoh really01:51
lotuspsychjetnx for notice tomreyn01:51
tomreynmodel: N7x0WU, (uefi) bios date: 06/11/201801:51
lotuspsychjeN7x0WU v: 7.009 date: 05/14/2018 mine01:53
tomreynsame model even, just different bios01:54
lotuspsychjenot sure its related but this came yesterday aswell tomreyn https://bugs.launchpad.net/bugs/183881802:04
ubot5Ubuntu bug 1838818 in xorg (Ubuntu) "intel graphic" [Undecided,New]02:04
OerHeksPackage: xorg (not installed) ...02:04
tomreynlol02:05
OerHeksjust wondered ..02:05
tomreynit's also i386 and LXDE02:05
tomreynor would be LXDE rather02:06
TJ-The source package is xorg, but there isn't a binary package of the same name02:06
OerHeksyes, and response on lotus bugreport is on KDE02:06
lotuspsychjeyeah description isnt the best here lol02:06
tomreyn version.xserver-xorg-core: xserver-xorg-core 2:1.19.6-1ubuntu4.302:06
sarnold Uname: Linux 5.0.0-050000-generic i68602:07
TJ-[    0.169959] ** You are using 32-bit PTI on a 64-bit PCID-capable CPU. **02:07
lotuspsychjeoO02:07
tomreynis that a mainline ppa kernel02:07
lotuspsychjetested something similiar yesterday02:08
lotuspsychje5.0.0-050000rc1-generic02:08
sarnoldstatus installed linux-image-5.0.0-050000-generic:i386 5.0.0-050000.20190303203102:09
sarnoldis that really a five month old build? or.. I'm very confused02:09
lotuspsychjenot sure this user has it installed though?02:09
lotuspsychjei was helping bisect02:09
lotuspsychje*why02:09
OerHeksi hope not LINUXMINT-19.1/5.0.0-050000-GENERIC/I68602:10
lotuspsychjeheh02:11
lotuspsychjecurrently testing Linux Rootbox 5.2.0+ #23 with fastboot=0 and no flickering with the dev02:12
TJ-I can't see anything wrong in that report, Xorg.log looks fine02:13
lotuspsychjeTJ-: didnt find intel errors in his dmesg neither02:14
lotuspsychjeno underrun like mine02:14
TJ-lotuspsychje: I wonder if the actual issue is a login loop or similar02:15
OerHekswith me, it happened before boot, i could perform ctrl alt del to reboot.02:16
lotuspsychjeyeah could be, his description is too vague02:16
lotuspsychjeOerHeks: i only get in trouble on desktop after few sec, at gdm3 and suspend too02:17
OerHeksi did 2 things, boot with live iso, and fix filesystem that appeared not to have issues, then booting in recovery, dpkg option to fix packages.02:17
OerHeksi see no simular questions .. https://askubuntu.com/questions/tagged/boot02:27
=== guiverc2 is now known as guiverc
marcoagpinto[11:42] <marcoagpinto> Buaaaaaaaa... I didn't go to work... I am depressed10:43
lotuspsychjedrink a cola, it all will be better10:44
daftykinsxD10:44
marcoagpintolotuspsychje: I have already drank ~3 litres and no effec10:44
marcoagpintoeffect*10:44
daftykinsaside from you bouncing off the walls?10:44
daftykins;)10:44
lotuspsychjeoh, you can mix rum into it :p10:45
lotuspsychjecuba libre cola!10:45
marcoagpintolotuspsychje: I can't drink alcohool because of the medicins I take10:45
jeremy31lotuspsychje: I tired the 5.0.0-23 kernel and no flickering on this HP laptop11:24
jeremy31tried11:24
lotuspsychjejeremy31: ok tnx for the test11:26
lotuspsychjejeremy31: might be related to clevo panel only?11:28
jeremy31It could be because of the display used, can you connect to external monitor?11:29
lotuspsychjejeremy31: didnt test that yet11:29
lotuspsychjegood idea11:30
lotuspsychjejeremy31: lol, this bug gets even weirder11:34
lotuspsychjewhen i type laptop screen gets black11:35
lotuspsychjeand external screen on hdmi flickers11:36
jeremy31can you switch to hdmi only?11:36
lotuspsychjewhen i use mouse, laptop screen is normal11:36
lotuspsychjehdmi only flickers the tv too11:38
BluesKajHowdy folks11:47
marcoagpintoBluesKaj! Hello!12:34
BluesKajhi marcoagpinto12:35
marcoagpintoBluesKaj: I haven't gone to my weekend job as I am depressed... I spent the whole week working on the thesis, day and night, and I am feeling terrible12:36
marcoagpinto:)12:36
BluesKajhave some cola :-)12:37
marcoagpintolast night I finished another revision12:37
marcoagpintoI already drank 3,5 litres12:37
marcoagpintono effect12:37
BluesKajno wonder you feel terrible, that's waaay too much12:37
marcoagpintoI know... it is so hard to deal with the pression12:38
lotuspsychjewb TJ-15:09
lotuspsychjetomreyn: 1838851 looks interesting heh, we might need a dmesg there15:44
tomreynlotuspsychje: right thats the bug i was just looking at15:45
lotuspsychjeoh nvm its in log.txt15:45
tomreynthere's mesg there but of 4.1815:45
tomreyn*dmesg15:45
lotuspsychjeLinux version 5.0.0-23-generic (buildd@lgw01-amd64-030) in his log.txt15:46
tomreynits an amdgpu driven gpu though15:46
lotuspsychjelets have a look15:46
tomreynoh right log.txt, i was looking at dmesg.txt15:48
tomreynso this system went into suspend, then power cycled15:50
lotuspsychjeyeah doesnt sound its related to mine15:50
tomreynAMD Ryzen 5 260015:51
lotuspsychje!info linux-image-generic disco18:04
ubot5linux-image-generic (source: linux-meta): Generic Linux kernel image. In component main, is optional. Version 5.0.0.23.24 (disco), package size 2 kB, installed size 15 kB18:04
Kevin199Hiya18:46
lotuspsychjeKevin199: what are you looking for in an Os?18:46
Kevin199I want it to be as fast as possible, I want to click 1 button for email, browser, etc18:47
Kevin199Preferably run most my services in the terminal18:48
tomreynKevin199: i guess you can do this on either.18:55
tomreynthe major differences will be that ubuntu goes for more stability, less things breaking, is a more vendor supported / tested platform, whereas arch does not usually hold back on version upgrades, tries to always run the very latest of everything, which probably means more things will break.18:58
tomreynpersonally, i mostly just want my desktop system to work reliably, don't always need the very latest software / features, and if i do i use !HWE and !PPA -s or build it myself.18:59
tomreynand on servers i definitely want stability.18:59
Kevin199I like stability too, I'm very new to Linux so I don't 100% understand the variety in distros19:00
Kevin199There's so many of them and it's quite bizzare19:00
tomreynso to me the tradeoff of going from ubuntu to arch is you get the latest versions faster, at the cost of having to fiddle more.19:01
tomreynif you have backups, by all means try more distros, at least a rolling and a non rolling one, and maybe the large ones.19:02
tomreynyou can do it in a VM but it's not really the same as doing it as your primary OS on your primary computer19:03
Kevin199I might try Arch in a VM once I figure out the installation process19:05
daftykinsheh oh dear in at the deep end ;)19:07
marcoagpintomy dear beloved brothers!19:29
wasanzyHello19:40
marcoagpintohey hey19:40
marcoagpinto>:)19:40
wasanzywith the help of tomreyn yesterday I discovered the malware that was consuming the system's CPU at a high rate. In short, the info about the malware is here: https://www.virustotal.com/gui/file/ed3b7209ee905cc5a2a2b33f351511c895ea6913428536b9e162eb487a24528f/detection19:43
wasanzyI am not able to determine the attack vector yet. Running file /var/lib/postgresql/10/main/postgresq1 output this : https://paste.debian.net/1094265/19:45
tomreynhi wasanzy, did your clamav scan bring up any other files?19:47
wasanzyNo19:48
wasanzythat was the only file it brought out19:48
tomreyni think you had not yet an answer to my question of whether the postgrsql server may have been directly accessible from the internet - have you learnt anything about this situation since?19:49
wasanzythe postgresql server doesn't have direct access from the internet19:49
tomreynso you have you checked your firewall configurations and concluded there are no rules / policies set that would allow for this?19:50
tomreyni understand that it will have a LAN IP address and is therefore not immediately reachable form the internet, but you never know whether there was a freelancer who 'temporarily' 'needed direct access' so a port forwarding or other firewall rule was set up.19:52
tomreyn(thus check it)19:52
wasanzyyes, let me paste you the rules19:52
tomreynhttps://www.postgresql-archive.org/posgresql-log-tp6021877p6021904.html - what we looked at yesterday - also has this statement: "I've also noticed there is a n596tx.so which is not a part of standard installation."  you could search your file system for a file named like this:   sudo find / -type f -name 'n596tx.so'19:55
wasanzylet me check that19:57
tomreynyou can also install 'debsums' (apt package) and have it list any files present on this system which deviate from files provided by debian packages at the same location:  sudo debsums -sc19:58
wasanzythat file does not exist19:58
wasanzyhave you taken a look at the firewall rules?20:00
tomreynwasanzy: i missed the private message20:02
tomreynlooking now, but i'm not that good with iptables20:02
tomreynoh this is simple enough, ok20:02
wasanzyok20:02
tomreynwasanzy: so this server did have a public ip address with no NAT or hardware firewall in front?20:03
wasanzyyes20:03
TJ-wasanzy: you can use "sudo dpkg --verify" to verify all package-installed files haven't been conpromised20:06
TJ-wasanzy: but as I said yesterday the best place to look is the apache web-server log files plus any the application running on apache creates. Knowing what web-applications are being used might help us figure it out20:07
wasanzytomreyn: debsums -sc -r /  return nothing20:08
wasanzyTJ-: OK am running that20:08
wasanzyI check the nginx logs actually20:08
wasanzywe don't run apache on the server20:09
TJ-wasanzy: oh, I thought it was apache. Same thing anyhow... figure out the time frame between which the infection must have occurred then look for clues between those times20:10
TJ-wasanzy: is the web-application something standard/open-source or custom ?20:10
tomreynyes, we should discuss all of the web applicationS20:11
wasanzyTJ-: https://paste.debian.net/1094270/   that is output of dpkg --verify20:11
wasanzyThe web application is custom build. they are java applications actually20:12
TJ-wasanzy: is nginx acting as a proxy ?20:13
TJ-wasanzy: most java web apps uses Tomcat or some J2EE container20:13
tomreyni'd also be interested in the output of     ls -l /var/lib/postgresql/10/main/     if you can share this20:14
TJ-wasanzy: you need to run that command as root (sudo) so it can access everything... but generally most changes under /etc/ will be local admin config changes... but its worth triple-checking20:14
wasanzyNginx is serving as a proxy. the app is a stand-alone no tomcat20:15
tomreynwe could also search for all files changed since when the intrusion likely happened. we know the miner started yesterday, which means it must have been before then, but we do not yet know any more than that20:15
wasanzyhttps://paste.debian.net/1094271/20:16
wasanzytomreyn: miner started on the 1st of August, thus 3 days a go20:17
tomreynthanks for clarifying20:18
TJ-wasanzy: so should be easier to track how it got added then20:18
TJ-wasanzy: I presume your web-application (Java) is using raw SQL statements in talking to Postgresql ?20:19
wasanzyunless I confirm from the developers20:20
TJ-wasanzy: so at some point I'm guessing that some front-facing public form input is not being sanitised and is able to add arbitrary SQL commands with a "; ..." - this would explain how/why the malware executes as the postgres user account20:20
wasanzythe only entry to the db to the best of my knowledge is user/password login on the app20:21
tomreynwasanzy: please also show    stat /var/lib/postgresql/10/main/postgresq1    and     getfattr --dump /var/lib/postgresql/10/main/postgresq120:22
tomreyngetfattr is provided by the    attr    package20:24
TJ-wasanzy: I really wouldn't keep that server operating. I'd replace it with a known clean backup20:25
TJ-wasanzy: you can always keep the VM alive for forensics but right now you're risking whatever business/service relies on it20:26
wasanzytomreyn" https://paste.debian.net/1094274/20:26
tomreynTJ-: i'm not sure this info got to you the other day, but root owned audit logs in /var/log/audit* were also deleted. so worst case the fact the miner was postgres owned could be an attempt to mislead.20:27
wasanzyTJ-*: The server is no more processing services, taken it off yesterday20:28
tomreynwasanzy: i second this, you should really not boot this system anymore. you should only access the file system from a frehly installed ubuntu system.20:28
wasanzytomreyn: I can only access the server remotely20:29
TJ-tomreyn: really? you're sure of that?20:29
wasanzyuser.xdg.origin.url="http://207.148.118.183/post0120/post" could this mean this is the source of the malware?20:30
TJ-wasanzy: It's Linode I noticed, so you could access the VM through the Finnix recovery option20:30
tomreynyeay20:30
tomreynexactly20:30
tomreynthis server is down, though20:31
wasanzytomreyn: were you referring to my question?20:31
wasanzyI mean the source of the malware question20:32
tomreynwasanzy: yes, postgresq1 was downloaded from http://207.148.118.183/post0120/post using wget (unless this information was falsified)20:32
tomreynanother VULTR system.20:33
wasanzywhich could mean the attacker got access to our system and used wget to download?20:34
tomreynsure, that's the hypothesis i'm operating on since reading https://www.postgresql-archive.org/posgresql-log-td6021877.html yesterday20:35
tomreynwasanzy: back to the point that you should not be booting this server anymore: we have to assume ti was rooted. after that, a rootkit may have been installed. you can no longer know what this system does, it may spread malware further in your network, and on the internet. it may have logged your login credentials when you logged in using ssh. and worse.20:37
tomreynother approaches i can think of now is to see if you can use undeletion utilities to recover files from /var/tmp and /var/log20:41
tomreynand to look for suid + sgid files across the entire file system20:41
tomreyni mean across all the file systems20:42
wasanzyif what I pasted here is true: https://paste.debian.net/1094274/ then my case is the same as https://www.postgresql-archive.org/posgresql-log-td6021877.html20:43
wasanzytomreyn: do you have any undeletion utility in mind?20:44
wasanzynote: I rebooted the system20:44
tomreynwhich file system do you hav there?20:45
tomreynextundelete for ext3/420:46
tomreynor ext4magic20:46
tomreynhere, too, you introduce more problems by running the server from the original installation: you're overwriting data, making data recovery much less likely20:47
tomreynwhenever you do forensics, any possibly compromised storage locations must only be mounted read-only.20:48
wasanzyext420:51
TJ-wasanzy: if it was me I'd create a local guest VM with the same release/architecture and  packages as the Linode, then use rsync to copy from Linode all the *changed/different* files and log which files are transferred by rsync. Then I can test the identical set-up locally AND know which files need checking20:51
tomreynsorry TJ, i somehow missed this, thought you were asking wasanzy for confirmation. what were you referring to here? <TJ-> tomreyn: really? you're sure of that?20:55
TJ-tomreyn: sure something deleted audit logs?20:55
TJ-tomreyn: because those same messages will be in the journald logs20:55
tomreynthat's what wasanzy implied20:55
tomreyni think he said that audit logs are in /var/(log/audit* but those logs are missing for the very day the intrusion occurred.20:56
tomreynif they're also in the systemd journal this should be investigated20:56
wasanzyhow do I find them in the system journal?20:57
tomreynjournalctl is the utility used to access those logs20:58
TJ-wasanzy: which ubuntu release is it?20:58
wasanzy18.0420:58
tomreyni think you said 18.04.2 fully up to date yesterday?20:59
wasanzyyes20:59
tomreynjournalctl --list-boots    could be of interest to tell which uptime the system had20:59
TJ-wasanzy: try "journalctl -u auditd.service"20:59
tomreynmaybe also --verify to see if there's anything missing21:00
TJ-wasanzy: it could depend on how auditd configures its logging21:00
wasanzyAug 01 18:47:34 minex360-linode-prod-1 systemd[1]: Stopping Security Auditing Service...21:02
TJ-well, I have to go out. It's almost midnight and we've just started combining the oil-seed rape21:02
wasanzyI think that was when I rebooted the server21:02
wasanzythanks a lot TJ-21:02
TJ-"minex360-" ? ironic!21:03
tomreyngood luck on the old-seed rape.21:06
tomreynbrinmg flashlights21:06
wasanzytomreyn: --verify is running21:08
tomreynthis can take a while. can you show the latest boots, too?21:09
wasanzyhttps://paste.debian.net/1094280/   -> ---verify21:13
tomreynso they seem to be complete, or coherent21:15
wasanzyreboot   system boot  4.15.0-55-generi Thu Aug  1 18:49   still running21:15
tomreynwasanzy: that's just the latest boot. the ones before that would be more interesting21:17
wasanzylast reboot => that is the only entry returned21:19
tomreynby --list-boots ?21:20
tomreynwhat you posted lookd more like output of the "last" command21:22
tomreynso sourced from /var/log/wtmp21:22
tomreynbut i'm asking about the output of    journalctl --list-boots    which would provide output in a different format21:22
wasanzyext4magic -m  -d /var/log21:24
wasanzy-1 36e9fc446ca743de91fc3aeafa76b2eb Mon 2019-07-29 12:00:01 UTC�<80><94>Thu 2019-08-01 18:47:34 UTC21:25
wasanzy 0 ad41338ef7424c76a7f1ba629918d6c9 Thu 2019-08-01 18:49:23 UTC�<80><94>Sat 2019-08-03 21:24:22 UTC21:25
wasanzyext4magic -m  -d /var/log => doesn't seem to be recovering anything21:26
tomreynwasanzy: you did not specify the file system to operate on, see <filesystem> on the ext4magic man page21:29
tomreynwasanzy: are those the only boots    journalctl --list-boots    reported, or the only ones you shared with us?21:29
tomreynit'd help to get a bit more context from you in general.21:29
wasanzythe only ones reported21:30
tomreynok21:30
tomreynwasanzy: can you share the full log from boot -1 using    jounrctl -b -1 | nc termbin.com 9999     or, if that's not an option (I'd understand), can you share this:    journalctl -b -1 | grep 'Linux version'21:33
tomreynsorry, the first command was     journalctl -b -1 | nc termbin.com 999921:33
wasanzyext4magic /dev/sda3 -R -a $(date -d "-5day" +%s)  => you think this could help?21:33
wasanzyjounrctl -b -1 | nc termbin.com 999 => no output21:35
wasanzyjournalctl -b -1 | grep 'Linux version' => no output21:35
tomreynwasanzy: you missed one 921:35
wasanzyjournalctl -b -1 | nc termbin.com 9999 => no output21:36
tomreynso this would post the log from    Mon 2019-07-29 12:00:01 UTC till  Thu 2019-08-01 18:47:34 UTC online:    journalctl -b -1 | nc termbin.com 999921:36
tomreynhmm weird21:37
tomreynif you just run this?    journalctl -b -121:37
tomreynmaybe some logs were actually deleted there, too. can you show    ls -lahR /var/log/journal/  | nc termbin.com 999921:38
wasanzyjournalctl -b -1 => print a lot of entries21:39
wasanzyhttps://termbin.com/0zw921:39
tomreynwasanzy: the output of     journalctl -b -1      may copntains logs on what the intruder did, and which they failed to delete.21:41
wasanzyok I will look a that21:42
tomreynthe oldest system logs you still have are from   Jul 29 18:2421:42
tomreynwhat does this say ?    getent passwd postgres21:43
wasanzyam trying to run this: ext4magic /dev/sda -R -a $(date -d "-4day" +%s)21:43
wasanzypostgres:x:111:116:PostgreSQL administrator,,,:/var/lib/postgresql:/bin/bash21:44
tomreynokay this looks normal21:46
wasanzyok21:48
wasanzyERROR: can not use "RECOVERDIR" for recover directory. It's the same filesystem : "/dev/sda"21:49
tomreynright, this is an intelligent utility, it would not write data to the same storage it is trying to recover data from.21:49
tomreynafter all, thois could prevent recovery of this data21:50
tomreyncan you tell when this server was actually installed? the oldest journalctl logs date back to only 2019-06-2921:50
wasanzythe server was installed before I even joined the organization last year21:51
tomreynhow much disk space is there available on /var/log?    df -h /var/log21:58
wasanzy117G21:59
tomreynsystemd will automatically delete old logs when it reaches certain storage thresholds. in your case, it reached the 4 GB fixed threshold, thus old system logs are gone22:01
tomreynapparently this system was really logging a *lot*22:01
tomreynmore than ususal22:01
wasanzyam coming to boot into rescue mode22:02
tomreynit created 10 log files each sized 128 MB *after compression* per day22:03
wasanzyright22:03
tomreynthis suggests something was not properly configured / misbehaving in the first place.22:03
tomreynas you can surely see when looking at   journalctl -b -1 -e22:04
tomreyn(-e goes to the end of the log period)22:04
wasanzyoutput starts from Aug 0122:05
tomreyni assume you can't share this log?22:07
TJ-whatever the custom java web-application is I'd expect it to be using the java.logger interface to do its own logging, which might be a better place to investigate22:09
Ben64bleh, still no window controls in chrome22:12
Ben64not sure what update broke it, but it's kinda annoying22:12
tomreynTJ-: we do have audit logs via journalctl starting Aug 01, but i don't know how to work with them22:16
tomreyn(also this may well be too late)22:16
TJ-tomreyn: if the attack vector is the java web-app > postgresql raw SQL input, then I'd put more reliance on the java-app's own logs (if it does log!)22:17
wasanzyTJ-: Yea the java app has logs. I can see a lot of direct sql statements in the logs. "Select statements though"22:17
tomreynselects would work22:17
tomreynselect * into outfile (i think this is mysql specific, not sure, but postgres may have something similar)22:18
TJ-wasanzy: I'd look for anything matching the regexp "..*;[^$]" (in other words, any statement that has a semi-colon NOT at the end of the line22:19
TJ-wasanzy: that'd mean the bit after the semi-colon was an additional statement, which if raw input is allowed, would be the obvious vector22:19
tomreynthat's %3B or %3b is url encoded22:19
tomreynthat's %3B or %3b IF url encoded22:19
TJ-wasanzy: the other possibility is the java application itself, and whatever user account it runs as, is compromised22:20
TJ-this assumes it's a high level attack via services and not a kernel-level compromise22:21
wasanzy zgrep  "..*;[^$]" /path/to/logdir/* | grep -i "SELECT"22:24
wasanzynothing yet22:26
TJ-wasanzy: I'm not guaranteeing my syntax was correct!22:28
TJ-seems to work in a test though:  echo -e "select * from table where x=y;\nselect * from table where x=y;select input >/var/tmp/test" | grep '..*;[^$]'22:30
wasanzyyea I got some outputs but not much to think is a hack. looks like some exceptions22:34
tomreynhow about nginx logs, it would onl yhave GET requests logged though, and only if you did log succesfull requests.22:35
wasanzyI could look for post requests though22:37
tomreynthose wouldn't be logged by a web server normally22:38
tomreynit appears that the "search" web app allows for self-registration, possibly providing extended access?22:40
TJ-? did we find out what the web-application is?22:43
tomreyni did find some, i think22:44
tomreynbut won't discuss it unless wasanzy wants me to22:44
tomreynhe passed me some syslog in private22:44
wasanzyTJ- and tomreyn: I shared paste in private with you two22:48
wasanzyPlease study that and see if you can make any sense out of it22:49
tomreynthats sshd, running as root, accessing /etc/passwd to verify a connecting user exists22:50
tomreyn...i think22:50
TJ-wasanzy: ahhh, I have messages blocked22:50
wasanzyblocked?22:50
wasanzyyou mean you blocked private messages?22:50
TJ-wasanzy: Yes22:50
wasanzyok22:51
tomreyna rather common setup actually ;)22:51
TJ-wasanzy: otherwise people think they can bother me for personal support constantly22:51
wasanzyok22:52
tomreynTJ-: did you receive those 5 lines from syslog since? they give away the server's public IP address, which you can then use to determine the application host names based on the SSL certificate on 44322:52
tomreyn(HTTPS)22:53
TJ-tomreyn: no, and I have to go anyhow, we're working through the night22:53
tomreynyes, you said so, ok, was just wondering22:53
TJ-I've been in and out as the loads arrive from the combine22:54
tomreyncool22:54
tomreynwasanzy: so i registered a new user on the 'search' web app, and was then able to connect a database to it. i connected the postgresql database on 127.0.0.1 (the server itself) , authenticating as the postgres user. tested the connection - it succeeded.22:56
tomreynit doesn't seem possible to exfiltrate data this way directly, but this is probably not sound.22:56
tomreynoh actually i can access all databases22:58
tomreynand exfiltrate data22:58
wasanzythat is my server?22:58
tomreynso i'll stop here22:58
tomreynthe one which is now running at the ip address listed as the ssh server destination in the latest log excerpt you shared22:59
tomreyni assume this is the replacement production server you setup?22:59
wasanzyno23:01
tomreynahem, actually thios hostname points to a different server of the same organization. i'll send you details in private message.23:01

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!