I'll send you this evening the list of installed packages.
I have had the opportunity to clean the system an hour ago. I have
uninstalled proftpd since I do not use it anymore, but as I already sent
you the version involved, it does not really matter ... the only dumb thing
I did is that I added --purge to the apt-get remove command ...

I suspected proftpd and a quick look at the proftpd logs shows a really
great number of login attempts (bruteforce like) and several "too long
command" thingies (I'll be more specific this evening), the one last being
at the exact same time the mod_facl error and the psadmin user creation.
You said mod_facl is not active by default. It's quite strange since I
didn't remember modifying the proftpd configuration since I installed it a
few month ago.

Furthermore, I have a tripwire installed that did not show anything worth
mentionning besides passwd and shadow modification. Bruteforcing passwords
on the server seems unlikely since root password and user passwords were at
least 8 chars long and mixed low and upper case, digits and ponctuation.

Lastly, but that will probably not be of any interest to you, the hacker
left a binary .bash file in the psadmin home dir (the user he created). I
renamed it and kept it for later use if there is a way to fingerprint it
and link it to a known rootkit.

Since the user was created only milliseconds after the facl error, I
suspect either a nicely crafted buffer overflow in the mod_facl triggered
the user creation or a script triggered by an exploit (linked but maybe not
caused by the mod_facl error) created it ... It does not seem humanly
possible to type that fast ...

Additional information: The hacker had launched an additional sshd on port
59997 and created 2 entries for users userx and default in passwd and
shadow with id 0 and groupid 1 for default and id/groupId 9/9 for userx.
I am not that skilled in resolving security issues but it seems to me
there is no such users automatically created by any debian package, and
thus I deleted the corresponding lines in passwd and shadow.

On the "not so skilled" topic, I have an other problem, though ... It
seems to me the default tiger and tripwire configuration are not completly
coherent with default configuration, especially concerning /etc/passwd
content (default shell for instance: nologin or valid shell for some
administrative users). I know this is probably none of your concern but if,
by any means, you could be of some help ...
If you know any debian security geek that could explain some of those
things to me, I'd be glad to listen/read for hours ...

Any way, thx for answering that fast and thanks for any further hint you
might provide.
Carm

On Mon, 15 Nov 2010 12:04:26 +0100, "Francesco P. Lovergine"
<fran...@debian.org> wrote:
> tag 603555 + moreinfo
> thanks
> 
> On Mon, Nov 15, 2010 at 11:18:35AM +0100, Jean Couillaud wrote:
>> 
>> Package: proftpd-basic
>> Version: 1.3.3a-5
>> 
>> Hi, 
>> 
>> My server just got rooted and what I've done for now, to dig into what
>> could have
>> been the leak, points to proftpd, mod_facl in particular.
>> I won't have a way to dig further until this evening (UTC+1 local
time),
>> but it is a testing(squeeze) debian almost up to date with only ssh,
>> apache and
>> proftpd available from the outside. 
>> 
>> Here is the logcheck notification that lead me to think mod_facl is
>> guilty: 
>> 
> 
> The mod_facl is not active by default. It would help having a look 
> to your complete configuration. That said, I see no evidence of 
> proftpd being a possible guilty by your report.



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to