1 |
> I recently discovered that my Gentoo servers were compromised (despite having |
2 |
> followed the Gentoo Security Guide's recommendations) when users installed |
3 |
> root kits in /dev/shm. |
4 |
> |
5 |
> Is this a widely-known exploit? If so: Why isn't it addressed in the Gentoo |
6 |
> Security Guide? |
7 |
|
8 |
as was said already, it's not an exploit per se, it's a hacking technique |
9 |
to stay on an already compromised box. /dev/shm is a tmpfs filesystem, you |
10 |
can check your 'mount' output or /etc/fstab. most likely it isn't mounted |
11 |
with the noexec (let alone nodev, nosuid, etc) options so it serves as an |
12 |
ideal hiding place (as in, many people don't think of it as a general |
13 |
purpose storage place). |
14 |
|
15 |
as for the actual compromise, did you look through your logs to find out |
16 |
how they may have gotten in (assuming they didn't clean them up of course)? |
17 |
also, if you were running hardened, can you look for PaX logs (grep for |
18 |
'PAX' in your logs)? |
19 |
|
20 |
|
21 |
-- |
22 |
gentoo-hardened@g.o mailing list |