On Mon, 22 Sep 2008 15:47:26 +0200, Bill Davidsen <davidsen@xxxxxxx> wrote:
roland wrote:
On Sat, 20 Sep 2008 20:48:47 +0200, Bill Davidsen <davidsen@xxxxxxx>
wrote:
The worrying thing is that since the sshd now asks for ssh2 protocol
only, there is a new sshd operating, one you didn't install, and one
which may be copying keystroke data (login names and passwords) to
some unauthorized other site. I can't say that's happening, but this
has all of the characteristics of that. It could also be caused by an
upgrade of sshd, although I read your posts to say that only you could
do that.
It would be useful to use 'ps' to see which sshd is running, and to do
an 'ls -l' and md5sum on the executable and post the values here. Also
a telnet to the ssh port usually gives the protocol and sshd version,
although that can be faked. Post that if you wish
You will find it in annex
Thanks again for your time
From the attachment:
> telnet localhost 22
> Trying 127.0.0.1...
> Connected to localhost.
> Escape character is '^]'.
> SSH-2.0-SSH-1.99-OpenSSH_3.5p1
That is a *very* old version of OpenSSH, nothing you got from Fedora, I
believe. I think it's something which the hacker installed, and a hacked
sshd would be the perfect place to capture login and password
information.
> service sshd status
> As you can see it doesn't give sshd but this crazy characters, in
both cases
>
> 1628 ? S 0:02 ?a?@°Ó?@?
> 22871 ? S 0:00 ?a?@°Ó?@?
Just how old a Fedora do you have? This doesn't look at all as I would
expect. You might do "ls -lc /bin/ps" and see if that was recently
replaced as well. However:
> ls -l /usr/sbin/sshd
> -rwxr-xr-x 1 root root 3963123 sep 16 00:03 /usr/sbin/sshd
This looks as if the sshd was replaced a few days ago, shortly before
your first message to the list. That makes it even more likely that
passwords are being captured, perhaps even entire connect sessions.
It looks as if the machine has been totally penetrated, and of course if
you don't use different account names and passwords for other machines
they have as well.
This is an old version of redhat workstation, just before fedora was
released.
-r-xr-xr-x 1 root root 69772 feb 20 2003 /bin/ps
-rw-r--r-- 1 root root 33 feb 26 2003 /etc/redhat-release
more /etc/redhat-release
Red Hat Linux release 9 (Shrike)
I just wonder why this person/hacker is still trying to login with root
and other names. So he must have been unsuccessful the first time. Now
root login is blocked and the root passwd is changed.
From what you are saying I can understand that I should reinstall the
server, even if he is not successfully login in again?
roland
--
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines