[Cialug] CentOS Security
Tom Pohl
tom at tcpconsulting.com
Wed Mar 2 12:31:07 CST 2011
I'm a big fan of blocking ALL outbound traffic and requiring egress to go through a proxy server.
-Tom
On Mar 2, 2011, at 10:33 AM, Paul Gray wrote:
> On 03/02/2011 10:20 AM, L. V. Lammert wrote:
>> We had a web server (the only services exposed are a few web server &
>> php, .. not even any ssl or sensitive data) go bonkers a few days ago,
>> .. it appeared to be running some sort of attack code generating a
>> humongous amount of outbound traffic on port 80 to a server in Romania.
>> After finally getting a login I could find nothing unusual, and, upon
>> rebooting, I could find not locate any trace of a login on the box nor
>> any unusual changed files.
>>
>> Two questions:
>>
>> * Is it possible that the vector was a php attack that was memory
>> resident (and cleared on reboot)?
>
> It's likely that the attack vector was planted in a writeable directory, and that it's only a matter of time before an .ru IP address calls it up again. Never trust a compromised system, reboots never fix the crux of the issue: how did they root the box in the first place?
>
> Take it offline and rebuild.
>
>> * Does it make sense to block *outbound* port 80?
>
> Allow only egress 80 for CentOS updates, otherwise when you rebuild the box, yes...limit egress port 80.
>
> --
> Paul Gray -o)
> 314 East Gym /\\
> University of Northern Iowa _\_V
> Message void if penguin violated ... Don't mess with the penguin
> No one ever says "Hey, I can't read that ASCII e-mail ya sent me."
> _______________________________________________
> Cialug mailing list
> Cialug at cialug.org
> http://cialug.org/mailman/listinfo/cialug
More information about the Cialug
mailing list