FB_security 板


Ok, thanks a lot for all your kind help. I learned the pwd_mkdb manpage and the databases as you suggested. To clarify, I understand 9.1 kernel contains the non-vulnerable version of openssl library, hence mere apache/https is not vulnerable. However the vulnerable openssl port is installed for the mail software to provide imaps/pops/smtps services, so they are vulnerable. The following reply is what I'm confused: > In any case, heartbleed does *not* facilitate remote code execution or > code injection, only information retrieval, so unless your passwords > were stored in cleartext (or a weakly hashed form) in the memory of an > Internet-facing SSL-enabled service (such as https, smtp with STARTTLS > or imaps, but not ssh), you cannot have been "hacked" as a consequence > of heartbleed.I ssh into the system, and I /usr/bin/su to become root. Do my shell passwords show up in in clear text in the memory briefly, so the attacker could happen to harvest them? In another word, on a system with the vulnerable openssl port, do we need to change the shell password for root and other users, if these passwords are ONLY used in ssh and /usr/bin/su ? I googled and found few result, almost all are focused on changing user mail passwords and server certificates. Only found this page said they changed server root password: http://digitalopera.com/geek-rants/what-were-doing-to-combat-heartbleed/ Thanks, Joe > From: [email protected] > Date: Sat, 26 Apr 2014 12:02:05 -0500 > Subject: Re: am I NOT hacked? > To: [email protected] > CC: [email protected] > > Joe, > > Just thinking about this practically, I don't think you were compromised. > It seems more like you goofed the upgrade in the same way on each VM. Also, > if I were attacking, I wouldn't leave such overt traces that one would > immediately notice. And if the attacker were goofing up that badly, he'd > likely not do it the same way on every VM. Not that assuming anything about > an attacker's intelligence guarantees anything, but it does seem like an > odd thing to do. Not to mention other's comments about pre-10 not being > vulnerable, and local compromise requiring that your password or SSH key > was read by a process serving SSL sockets. > > If you decide it's likely your system was compromised while it was > vulnerable, shutting off the system is a priority to stop ongoing damages. > Then you have to mount its disks in a clean system so that whatever bad > stuff (bots, backdoors, etc) the attacker added don't just start again at > reboot, and to be sure the attacker doesn't merely add backdoors back while > you take them away. It's hard to be sure you fixed every single file that > was touched ...executables, dynamic libs, configs, and much more contain > subtle ways to leave a back door, and one could even patch the kernel to > hide a malicious process in memory. Starting from a fresh install and > copying your data over is really the quickest and safest approach. Since > "restore your data" usually means home directories, be sure to check > everyone's .ssh/authorized_keys for unwanted entries before copying. > > Try "man pwd_mkdb" for info on the password database; especially look under > the "FILES" heading. It's a good subsystem to know more about anyway, and > not complicated. It is perhaps easier to remember that using vipw to add a > blank line will sync everything than to remember the cryptic "pwd_mkdb -p > /etc/master.passwd" command though. > > Actually having a machine compromised is no fun; I've been there. I do hope > that's not the case for you. > > - Leif > > > On Sat, Apr 26, 2014 at 4:55 AM, Joe Parsons <[email protected]> wrote: > > > I was slow to patch my multiple vms after that heartbleed disclosure. I > > just managed to upgrade these systems to 9.2, and installed the patched > > openssl, then started changing passwords for root and other shell users. > > However I realized that, only the root password was changed. For other > > users, even though the "passwd userid" issued no warning, and "echo $?" is > > 0, the password is NOT changed. > > > > For more debugging, I tried to "adduser", the command was successful, and > > I can see the new entry "test" in /etc/passwd. However "finger test" > > complains no such user! Also, "rm test" complains there is no such user to > > delete as well. > > > > Furthermore, the mail server got problem sending email, the log file said > > there is no such user "postfix", and sure enough: > > > > # finger postfix > > finger: postfix: no such user > > > > while this "postfix" user certainly existed for years, and I can see see > > its entry in /etc/passwd. > > > > This appeared to all the multiple vms on multiple hosts, all running > > FreeBSD 9.2 now. > > > > I was paranoid, I really should have patched all these systems immediately > > reading that heartbleed news, as all these servers had the vulnerable > > openssl port installed! > > > > Until googling and I found this: > > > > https://forums.freebsd.org/viewtopic.php?&t=29644 > > > > it said "The user accounts are actually stored in a database. It's > > possible it got out of sync with your [file]/etc/passwd[/file] file.", and > > it suggested running "vipw" to fix it. > > > > I ran vipw, then saved, and quit. No joy. Then ran vipw again, made a > > change, then undid the change, save again. Now "finger postfix" found the > > user, and I can change user password now, and all the above problem > > disappeared. > > > > Am I right that, that I am NOT hacked? Is the above problem produced by > > the freebsd-update process? Is this supposed to happen? I just followed > > the handbook to update from 9.1-RELEASE to 9.2-RELEASE, never compiled > > kernel or tweak. > > > > Thank you! Joe > > > > _______________________________________________ > > [email protected] mailing list > > http://lists.freebsd.org/mailman/listinfo/freebsd-security > > To unsubscribe, send any mail to "[email protected] > > " > > > > > > -- > > As implied by email protocols, the information in this message is > not confidential. Any middle-man or recipient may inspect, modify, > copy, forward, reply to, delete, or filter email for any purpose unless > said parties are otherwise obligated. As the sender, I acknowledge that > I have a lower expectation of the control and privacy of this message > than I would a post-card. Further, nothing in this message is > legally binding without cryptographic evidence of its integrity. > > http://bilbo.hobbiton.org/wiki/Eat_My_Sig > _______________________________________________ > [email protected] mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "[email protected]" _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"







like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草
伺服器連線錯誤,造成您的不便還請多多包涵!
「贊助商連結」






like.gif 您可能會有興趣的文章
icon.png[問題/行為] 貓晚上進房間會不會有憋尿問題
icon.pngRe: [閒聊] 選了錯誤的女孩成為魔法少女 XDDDDDDDDDD
icon.png[正妹] 瑞典 一張
icon.png[心得] EMS高領長版毛衣.墨小樓MC1002
icon.png[分享] 丹龍隔熱紙GE55+33+22
icon.png[問題] 清洗洗衣機
icon.png[尋物] 窗台下的空間
icon.png[閒聊] 双極の女神1 木魔爵
icon.png[售車] 新竹 1997 march 1297cc 白色 四門
icon.png[討論] 能從照片感受到攝影者心情嗎
icon.png[狂賀] 賀賀賀賀 賀!島村卯月!總選舉NO.1
icon.png[難過] 羨慕白皮膚的女生
icon.png閱讀文章
icon.png[黑特]
icon.png[問題] SBK S1安裝於安全帽位置
icon.png[分享] 舊woo100絕版開箱!!
icon.pngRe: [無言] 關於小包衛生紙
icon.png[開箱] E5-2683V3 RX480Strix 快睿C1 簡單測試
icon.png[心得] 蒼の海賊龍 地獄 執行者16PT
icon.png[售車] 1999年Virage iO 1.8EXi
icon.png[心得] 挑戰33 LV10 獅子座pt solo
icon.png[閒聊] 手把手教你不被桶之新手主購教學
icon.png[分享] Civic Type R 量產版官方照無預警流出
icon.png[售車] Golf 4 2.0 銀色 自排
icon.png[出售] Graco提籃汽座(有底座)2000元誠可議
icon.png[問題] 請問補牙材質掉了還能再補嗎?(台中半年內
icon.png[問題] 44th 單曲 生寫竟然都給重複的啊啊!
icon.png[心得] 華南紅卡/icash 核卡
icon.png[問題] 拔牙矯正這樣正常嗎
icon.png[贈送] 老莫高業 初業 102年版
icon.png[情報] 三大行動支付 本季掀戰火
icon.png[寶寶] 博客來Amos水蠟筆5/1特價五折
icon.pngRe: [心得] 新鮮人一些面試分享
icon.png[心得] 蒼の海賊龍 地獄 麒麟25PT
icon.pngRe: [閒聊] (君の名は。雷慎入) 君名二創漫畫翻譯
icon.pngRe: [閒聊] OGN中場影片:失蹤人口局 (英文字幕)
icon.png[問題] 台灣大哥大4G訊號差
icon.png[出售] [全國]全新千尋侘草LED燈, 水草

請輸入看板名稱,例如:e-shopping站內搜尋

TOP