FB_security 板


Ok, thanks a lot for all your kind help. I learned the pwd_mkdb manpage and the databases as you suggested. To clarify, I understand 9.1 kernel contains the non-vulnerable version of openssl library, hence mere apache/https is not vulnerable. However the vulnerable openssl port is installed for the mail software to provide imaps/pops/smtps services, so they are vulnerable. The following reply is what I'm confused: > In any case, heartbleed does *not* facilitate remote code execution or > code injection, only information retrieval, so unless your passwords > were stored in cleartext (or a weakly hashed form) in the memory of an > Internet-facing SSL-enabled service (such as https, smtp with STARTTLS > or imaps, but not ssh), you cannot have been "hacked" as a consequence > of heartbleed.I ssh into the system, and I /usr/bin/su to become root. Do my shell passwords show up in in clear text in the memory briefly, so the attacker could happen to harvest them? In another word, on a system with the vulnerable openssl port, do we need to change the shell password for root and other users, if these passwords are ONLY used in ssh and /usr/bin/su ? I googled and found few result, almost all are focused on changing user mail passwords and server certificates. Only found this page said they changed server root password: http://digitalopera.com/geek-rants/what-were-doing-to-combat-heartbleed/ Thanks, Joe > From: [email protected] > Date: Sat, 26 Apr 2014 12:02:05 -0500 > Subject: Re: am I NOT hacked? > To: [email protected] > CC: [email protected] > > Joe, > > Just thinking about this practically, I don't think you were compromised. > It seems more like you goofed the upgrade in the same way on each VM. Also, > if I were attacking, I wouldn't leave such overt traces that one would > immediately notice. And if the attacker were goofing up that badly, he'd > likely not do it the same way on every VM. Not that assuming anything about > an attacker's intelligence guarantees anything, but it does seem like an > odd thing to do. Not to mention other's comments about pre-10 not being > vulnerable, and local compromise requiring that your password or SSH key > was read by a process serving SSL sockets. > > If you decide it's likely your system was compromised while it was > vulnerable, shutting off the system is a priority to stop ongoing damages. > Then you have to mount its disks in a clean system so that whatever bad > stuff (bots, backdoors, etc) the attacker added don't just start again at > reboot, and to be sure the attacker doesn't merely add backdoors back while > you take them away. It's hard to be sure you fixed every single file that > was touched ...executables, dynamic libs, configs, and much more contain > subtle ways to leave a back door, and one could even patch the kernel to > hide a malicious process in memory. Starting from a fresh install and > copying your data over is really the quickest and safest approach. Since > "restore your data" usually means home directories, be sure to check > everyone's .ssh/authorized_keys for unwanted entries before copying. > > Try "man pwd_mkdb" for info on the password database; especially look under > the "FILES" heading. It's a good subsystem to know more about anyway, and > not complicated. It is perhaps easier to remember that using vipw to add a > blank line will sync everything than to remember the cryptic "pwd_mkdb -p > /etc/master.passwd" command though. > > Actually having a machine compromised is no fun; I've been there. I do hope > that's not the case for you. > > - Leif > > > On Sat, Apr 26, 2014 at 4:55 AM, Joe Parsons <[email protected]> wrote: > > > I was slow to patch my multiple vms after that heartbleed disclosure. I > > just managed to upgrade these systems to 9.2, and installed the patched > > openssl, then started changing passwords for root and other shell users. > > However I realized that, only the root password was changed. For other > > users, even though the "passwd userid" issued no warning, and "echo $?" is > > 0, the password is NOT changed. > > > > For more debugging, I tried to "adduser", the command was successful, and > > I can see the new entry "test" in /etc/passwd. However "finger test" > > complains no such user! Also, "rm test" complains there is no such user to > > delete as well. > > > > Furthermore, the mail server got problem sending email, the log file said > > there is no such user "postfix", and sure enough: > > > > # finger postfix > > finger: postfix: no such user > > > > while this "postfix" user certainly existed for years, and I can see see > > its entry in /etc/passwd. > > > > This appeared to all the multiple vms on multiple hosts, all running > > FreeBSD 9.2 now. > > > > I was paranoid, I really should have patched all these systems immediately > > reading that heartbleed news, as all these servers had the vulnerable > > openssl port installed! > > > > Until googling and I found this: > > > > https://forums.freebsd.org/viewtopic.php?&t=29644 > > > > it said "The user accounts are actually stored in a database. It's > > possible it got out of sync with your [file]/etc/passwd[/file] file.", and > > it suggested running "vipw" to fix it. > > > > I ran vipw, then saved, and quit. No joy. Then ran vipw again, made a > > change, then undid the change, save again. Now "finger postfix" found the > > user, and I can change user password now, and all the above problem > > disappeared. > > > > Am I right that, that I am NOT hacked? Is the above problem produced by > > the freebsd-update process? Is this supposed to happen? I just followed > > the handbook to update from 9.1-RELEASE to 9.2-RELEASE, never compiled > > kernel or tweak. > > > > Thank you! Joe > > > > _______________________________________________ > > [email protected] mailing list > > http://lists.freebsd.org/mailman/listinfo/freebsd-security > > To unsubscribe, send any mail to "[email protected] > > " > > > > > > -- > > As implied by email protocols, the information in this message is > not confidential. Any middle-man or recipient may inspect, modify, > copy, forward, reply to, delete, or filter email for any purpose unless > said parties are otherwise obligated. As the sender, I acknowledge that > I have a lower expectation of the control and privacy of this message > than I would a post-card. Further, nothing in this message is > legally binding without cryptographic evidence of its integrity. > > http://bilbo.hobbiton.org/wiki/Eat_My_Sig > _______________________________________________ > [email protected] mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "[email protected]" _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"







like.gif 您可能会有兴趣的文章
icon.png[问题/行为] 猫晚上进房间会不会有憋尿问题
icon.pngRe: [闲聊] 选了错误的女孩成为魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一张
icon.png[心得] EMS高领长版毛衣.墨小楼MC1002
icon.png[分享] 丹龙隔热纸GE55+33+22
icon.png[问题] 清洗洗衣机
icon.png[寻物] 窗台下的空间
icon.png[闲聊] 双极の女神1 木魔爵
icon.png[售车] 新竹 1997 march 1297cc 白色 四门
icon.png[讨论] 能从照片感受到摄影者心情吗
icon.png[狂贺] 贺贺贺贺 贺!岛村卯月!总选举NO.1
icon.png[难过] 羡慕白皮肤的女生
icon.png阅读文章
icon.png[黑特]
icon.png[问题] SBK S1安装於安全帽位置
icon.png[分享] 旧woo100绝版开箱!!
icon.pngRe: [无言] 关於小包卫生纸
icon.png[开箱] E5-2683V3 RX480Strix 快睿C1 简单测试
icon.png[心得] 苍の海贼龙 地狱 执行者16PT
icon.png[售车] 1999年Virage iO 1.8EXi
icon.png[心得] 挑战33 LV10 狮子座pt solo
icon.png[闲聊] 手把手教你不被桶之新手主购教学
icon.png[分享] Civic Type R 量产版官方照无预警流出
icon.png[售车] Golf 4 2.0 银色 自排
icon.png[出售] Graco提篮汽座(有底座)2000元诚可议
icon.png[问题] 请问补牙材质掉了还能再补吗?(台中半年内
icon.png[问题] 44th 单曲 生写竟然都给重复的啊啊!
icon.png[心得] 华南红卡/icash 核卡
icon.png[问题] 拔牙矫正这样正常吗
icon.png[赠送] 老莫高业 初业 102年版
icon.png[情报] 三大行动支付 本季掀战火
icon.png[宝宝] 博客来Amos水蜡笔5/1特价五折
icon.pngRe: [心得] 新鲜人一些面试分享
icon.png[心得] 苍の海贼龙 地狱 麒麟25PT
icon.pngRe: [闲聊] (君の名は。雷慎入) 君名二创漫画翻译
icon.pngRe: [闲聊] OGN中场影片:失踪人口局 (英文字幕)
icon.png[问题] 台湾大哥大4G讯号差
icon.png[出售] [全国]全新千寻侘草LED灯, 水草
伺服器连线错误,造成您的不便还请多多包涵!
「赞助商连结」






like.gif 您可能会有兴趣的文章
icon.png[问题/行为] 猫晚上进房间会不会有憋尿问题
icon.pngRe: [闲聊] 选了错误的女孩成为魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一张
icon.png[心得] EMS高领长版毛衣.墨小楼MC1002
icon.png[分享] 丹龙隔热纸GE55+33+22
icon.png[问题] 清洗洗衣机
icon.png[寻物] 窗台下的空间
icon.png[闲聊] 双极の女神1 木魔爵
icon.png[售车] 新竹 1997 march 1297cc 白色 四门
icon.png[讨论] 能从照片感受到摄影者心情吗
icon.png[狂贺] 贺贺贺贺 贺!岛村卯月!总选举NO.1
icon.png[难过] 羡慕白皮肤的女生
icon.png阅读文章
icon.png[黑特]
icon.png[问题] SBK S1安装於安全帽位置
icon.png[分享] 旧woo100绝版开箱!!
icon.pngRe: [无言] 关於小包卫生纸
icon.png[开箱] E5-2683V3 RX480Strix 快睿C1 简单测试
icon.png[心得] 苍の海贼龙 地狱 执行者16PT
icon.png[售车] 1999年Virage iO 1.8EXi
icon.png[心得] 挑战33 LV10 狮子座pt solo
icon.png[闲聊] 手把手教你不被桶之新手主购教学
icon.png[分享] Civic Type R 量产版官方照无预警流出
icon.png[售车] Golf 4 2.0 银色 自排
icon.png[出售] Graco提篮汽座(有底座)2000元诚可议
icon.png[问题] 请问补牙材质掉了还能再补吗?(台中半年内
icon.png[问题] 44th 单曲 生写竟然都给重复的啊啊!
icon.png[心得] 华南红卡/icash 核卡
icon.png[问题] 拔牙矫正这样正常吗
icon.png[赠送] 老莫高业 初业 102年版
icon.png[情报] 三大行动支付 本季掀战火
icon.png[宝宝] 博客来Amos水蜡笔5/1特价五折
icon.pngRe: [心得] 新鲜人一些面试分享
icon.png[心得] 苍の海贼龙 地狱 麒麟25PT
icon.pngRe: [闲聊] (君の名は。雷慎入) 君名二创漫画翻译
icon.pngRe: [闲聊] OGN中场影片:失踪人口局 (英文字幕)
icon.png[问题] 台湾大哥大4G讯号差
icon.png[出售] [全国]全新千寻侘草LED灯, 水草

请输入看板名称,例如:BabyMother站内搜寻

TOP