On Thu, 9 Nov 2000, Rick Warner wrote:

> 1) Find out what has changed on the machine.  Use 'rpm -V' against all
> packages and see what was modified.  If they had root access, it is likely
> they changed some system utils to add a backdoor.

Sorry to hear you've been hacked Fred. 

On a related note, has anyone had their RPM database scrambled during an
attack? 

Since there is nothing protecting the database once root access is
obtained, rpm -Va shouldn't be trusted. But, I've not heard of any
attack yet they bothered to fixup the rpm db, it seems to me that would be
a fairly difficult thing to do. 

So, is there a consensus, should rpm -Va be trusted after a successful
attack?

Later,

Bill Carlson
-- 
Systems Programmer    [EMAIL PROTECTED]    |  Opinions are mine,
Virtual Hospital      http://www.vh.org/        |  not my employer's.
University of Iowa Hospitals and Clinics        |




_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to