1 |
On 9/19/07, Neil Bothwick <neil@××××××××××.uk> wrote: |
2 |
> On Wed, 19 Sep 2007 11:09:30 -0700, Grant wrote: |
3 |
> |
4 |
> > Last night my host sent out a message that their database had been |
5 |
> > compromised. I contacted them this morning and it turns out that all |
6 |
> > of their trouble tickets were exposed. I checked my records and |
7 |
> > (stupidly) I had included my root password in an email to them about a |
8 |
> > year ago. I (stupidly) hadn't changed the password since. I've |
9 |
> > changed it now and rebooted the system, but what do you think? Do I |
10 |
> > need to start this thing over? |
11 |
> |
12 |
> equery check sys-process/procps |
13 |
> equery check sys-apps/coreutils |
14 |
> |
15 |
> Make sure that none of the executable files have changed. |
16 |
> |
17 |
> Also, emerge and run app-forensics/rkhunter |
18 |
> |
19 |
|
20 |
I'm not a security expert, not even near. But, if I was in a possible |
21 |
vulnerable position like a leaked root password, wouldn't an "emerge |
22 |
-ef world" and a posterior offline "emerge -e world" replace any |
23 |
possible binary changed by an intruder? That would minimize the risk, |
24 |
and allied with rkhunter and other forensic tools and password change |
25 |
could make you pretty sure that your environment is safe afain... |
26 |
|
27 |
Just a thought... |
28 |
-- |
29 |
gentoo-user@g.o mailing list |