FB_security 板


Joe, Just thinking about this practically, I don't think you were compromised. It seems more like you goofed the upgrade in the same way on each VM. Also, if I were attacking, I wouldn't leave such overt traces that one would immediately notice. And if the attacker were goofing up that badly, he'd likely not do it the same way on every VM. Not that assuming anything about an attacker's intelligence guarantees anything, but it does seem like an odd thing to do. Not to mention other's comments about pre-10 not being vulnerable, and local compromise requiring that your password or SSH key was read by a process serving SSL sockets. If you decide it's likely your system was compromised while it was vulnerable, shutting off the system is a priority to stop ongoing damages. Then you have to mount its disks in a clean system so that whatever bad stuff (bots, backdoors, etc) the attacker added don't just start again at reboot, and to be sure the attacker doesn't merely add backdoors back while you take them away. It's hard to be sure you fixed every single file that was touched ...executables, dynamic libs, configs, and much more contain subtle ways to leave a back door, and one could even patch the kernel to hide a malicious process in memory. Starting from a fresh install and copying your data over is really the quickest and safest approach. Since "restore your data" usually means home directories, be sure to check everyone's .ssh/authorized_keys for unwanted entries before copying. Try "man pwd_mkdb" for info on the password database; especially look under the "FILES" heading. It's a good subsystem to know more about anyway, and not complicated. It is perhaps easier to remember that using vipw to add a blank line will sync everything than to remember the cryptic "pwd_mkdb -p /etc/master.passwd" command though. Actually having a machine compromised is no fun; I've been there. I do hope that's not the case for you. - Leif On Sat, Apr 26, 2014 at 4:55 AM, Joe Parsons <[email protected]> wrote: > I was slow to patch my multiple vms after that heartbleed disclosure. I > just managed to upgrade these systems to 9.2, and installed the patched > openssl, then started changing passwords for root and other shell users. > However I realized that, only the root password was changed. For other > users, even though the "passwd userid" issued no warning, and "echo $?" is > 0, the password is NOT changed. > > For more debugging, I tried to "adduser", the command was successful, and > I can see the new entry "test" in /etc/passwd. However "finger test" > complains no such user! Also, "rm test" complains there is no such user to > delete as well. > > Furthermore, the mail server got problem sending email, the log file said > there is no such user "postfix", and sure enough: > > # finger postfix > finger: postfix: no such user > > while this "postfix" user certainly existed for years, and I can see see > its entry in /etc/passwd. > > This appeared to all the multiple vms on multiple hosts, all running > FreeBSD 9.2 now. > > I was paranoid, I really should have patched all these systems immediately > reading that heartbleed news, as all these servers had the vulnerable > openssl port installed! > > Until googling and I found this: > > https://forums.freebsd.org/viewtopic.php?&t=29644 > > it said "The user accounts are actually stored in a database. It's > possible it got out of sync with your [file]/etc/passwd[/file] file.", and > it suggested running "vipw" to fix it. > > I ran vipw, then saved, and quit. No joy. Then ran vipw again, made a > change, then undid the change, save again. Now "finger postfix" found the > user, and I can change user password now, and all the above problem > disappeared. > > Am I right that, that I am NOT hacked? Is the above problem produced by > the freebsd-update process? Is this supposed to happen? I just followed > the handbook to update from 9.1-RELEASE to 9.2-RELEASE, never compiled > kernel or tweak. > > Thank you! Joe > > _______________________________________________ > [email protected] mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "[email protected] > " > -- As implied by email protocols, the information in this message is not confidential. Any middle-man or recipient may inspect, modify, copy, forward, reply to, delete, or filter email for any purpose unless said parties are otherwise obligated. As the sender, I acknowledge that I have a lower expectation of the control and privacy of this message than I would a post-card. Further, nothing in this message is legally binding without cryptographic evidence of its integrity. http://bilbo.hobbiton.org/wiki/Eat_My_Sig _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"







like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草
伺服器連線錯誤,造成您的不便還請多多包涵!
「贊助商連結」






like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草

請輸入看板名稱,例如:WOW站內搜尋

TOP