![]() |
We got HACKED!
Our server was hacked. We believe the hacker sniffed a plain text telnet session. No damage has been found.
We were advised to use SSH, but heard it is exploitable through a buffer overflow. We are running Linux. What software/protocol should we use to access the server? |
Get F-secure...
|
Quote:
|
ssh is perfectly secure. the exploit has been patched, but the exploit is largely misunderstood as well.
yes, it's a buffer overflow attack.. but it is one that requires the attacker to *already* be logged into an ssh client.. so they would have to already have a working user/pass in order to use the exploit. it is largely a problem on shared systems because the attacker can get root priveleges which he/she should not have. |
Quote:
here's the d/l page... great program... http://www.f-secure.com/download-purchase/list.shtml |
Quote:
http://www.chiark.greenend.org.uk/~sgtatham/putty/, for an SSH client and shut off telnet access to my servers completely. Have you heard of it? If so, how is it? |
I acutally prefer putty. I have used SecureCRT, and a few others and I find that putty suits my needs fine, and it's FREE.
I vote use putty. :2 cents: |
And ANY ssh client is preferable to Telnet. No matter your reservations about the exploit, remember you were just sending plain text commands to your server.
I don't even have telnet enabled on my boxes. Jake |
SSH is the only thing to use.
|
Make sure you disable telnet also, don't just stop using it.
|
if you are concerned that your telnet session has been sniffed, you need to also stop using FTP and switch to SFTP/FTP over SSH/SCP or something similar. SecureFX supports SFTP.
the reason being, FTP is just as insecure as telnet - it sends passwords in plaintext. if you do not stop using FTP, you might as well use telnet, too, because you're still just as fucked. now on to SSH. SSH is more secure, but there have been issues with various versions of it in the past. as is true with any software product, you need to make sure to monitor security lists and install necessary patches. sometimes your host can do this for you, sometimes you need to hire a sysadmin/security admin. |
I use ssh2
|
salsbury is correct... you gotta keep up to date on patching.
And just to clear some confusion here, any ssh client is fine, as long as you use ssh. Secure crt, f-secure, putty all use the same protocols... so use any of them, as long as you use ssh. |
Quote:
friendly advice from a random poster. you need to either upgrade or find someone to upgrade your Apache and PHP versions. it's as likely that the intruder came in through there as it is that they came through telnet. i see ssh isn't even on the server. if your host told you that they didn't install it because of a buffer overflow bug - switch hosts. today. |
|
Quote:
I was also told to do the same with FTP, and use SCP file transfer. Does anyone here know anything about that? |
Quote:
|
Not sure about the SCP file transfer... but F-secure also has a SSH file transfer utility that is pretty sweet...
|
Quote:
For all of you who use Putty or F-Secure for their SSH protocol, what do you use for FTP? |
Quote:
|
Quote:
|
Quote:
|
yeah you should be using ssh instead of just normal telnet
ssh is 128bit encrpted |
Quote:
|
Quote:
The best attitude to adopt is one that assumes the intruder already has root. I think its safe to say that should he have any given user/pass he could have su within a short period. and if he can cover his tracks well, it may even seem as though he is gone. Giving you a false sense of security. |
And POP3 is even more insecure than either telnet or ftp because of the frequency it sends your password across the net in plaintext. You can either use an SSH tunnel or find some other way to encrypt the traffic if you're going to use POP3.
-KC |
Quote:
|
Quote:
Thanks again for the heads up, guys... |
Quote:
|
Is WS_FTP secure?
|
Quote:
-KC |
The only reason I would take up jogging is so I could hear heavy breathing again. - Erma Bombeck
|
Quote:
|
Quote:
|
Hey,
You want to make sure you're using ssh2, in fact. SSH1 has crypto vulnerabilities -- they're unlikely, but possible. The goal is to make sure that no traffic to your box is using plaintext passwords. Of course, your paysite users are, but those accounts aren't important. If you implement your pop3 accounts as virtual (ie, no associated UNIX account) then you can also start treating those passwords as unimportant (worse case scenario: someone's email gets read) Another option, setup a VPN between your office and your servers and route all traffic over it. This requires a linux box in the office, but the cost of setting one up is low and the benefits are great. Don't forget you're just as likely to be sniffed on your local subnet as you are in the colo facility. Perhaps more likely, if your colo has proper subnets. As for FTP, I recommend setting up FTP over SSH2 (using SecureFX) or an SFTP client. Either method requires a special client, so you'll have to kiss WS_FTP goodbye. Is it worth it? Only if you don't want to post a GFY thread entitled "We got hacked!" Staying secure is a matter of staying current, slashdorque will have an item for almost all the vulnerabilities you'll encounter. Good luck, Buran |
Use cuteftp pro
sftp and ssh is supported |
yes Pop3 is plain text passwords.
if you MUST run pop3 on your server use qmail if running linux. and set it up to use virtual accounts. that way NO system user ids are ever used and if a person captures the password big deal, it is only good for looking at mail :-) |
Isn't it easier to use PGP than find an alternative to POP3? Any pros/cons?
|
Quote:
Setting up virtual accounts for email boxes... or setting up a VPN... or even an ssh tunnel (which is extremely easy to do) are probably your best bets with the mail. SecureFX is a great tool for doing secureftp (it works just like the other GUI ftp clients) only it's secure. Your admin will need to do some setup on the backend, but it's worth it. |
Quote:
|
All times are GMT -7. The time now is 06:34 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123