Subject: Re: NetBSD-3.1 was attacked: Bug of SSHD or cyrus-sasl?
To: Water NB <netbsd78@126.com>
From: Jeremy C. Reed <reed@reedmedia.net>
List: netbsd-users
Date: 01/12/2007 08:25:34
I remove three lists from my reply.
On Fri, 12 Jan 2007, Water NB wrote:
> 2) at last, login successfully via account cyrus.
How do you know? How do you know that was the first successful login?
> 3) install a program psyBNC 2.3.1 under /tmp and run it.
I have seen that before. (But never on NetBSD.)
> But this morning I found the cracker still logined the system after only
> two tries.
> It is impossible to try 2 times to get the correct password.
> So I guess that he used the bug of sshd.
> What bug? I don't know.
Did you kill the cracker? Kill the processes in use? (And firewall?)
If the cracker came back in after you changed the password, then there may
be a password logger (like other email said) or a hole somewhere else.
> Question 2) why /etc/passwd:cyrus has Shell: /bin/sh?
> I think /sbin/nologin is enough.
> In fact, when I change it to /sbin/nologin, the cracker stop cracking
> because he has to logout once he login.
I don't know. Sounds good to me.
As for logging in to the cyrus account ... if installed by pkgsrc that
password field is impossible and couldn't be used to login.
> Jan 12 00:07:04 mail sshd[22316]: Failed password for cyrus from
> AAA.BBB.CCC.DDD port 57590 ssh2
> Jan 12 00:07:04 mail sshd[19307]: Accepted password for cyrus from
> AAA.BBB.CCC.DDD port 57622 ssh2
> (!!!!!)
Strange. I don't understand why it had a valid password.
By the way, maybe you have files under /etc/mtree/ you can use with mtree
to check if files changed on your system.
Jeremy C. Reed