[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sheflug] Ramen worm



On 07 Feb 2001 20:33:48 +0000, Barrie Bremner wrote:
> You should really (I do it when config'ing the machine after install)
> shutdown every service/server running on your box.
> It should close up most of the common holes found on boxen.


It doesn't close up any holes, it papers over cracks :) I think you're
thinking of the BOfH system of security:

    "No service, therefore, no denial"

Hmm :)

 
> Download nmap as well - use that to portscan your own machine once you
> have finished.


Which will not show any holes either :) 'lpd is running'. Yes, I need to
print. You run the services you need. Those you don't you can turn off.
Turning off all services is a little bit weak really, it's possibly the
starting of a security overhaul, but nothing like the middle or the end
:)


> I'm not sure exactly which files Ramen modifies - but unless someone
> else contradicts me - I'd be looking at doing a clean install.


Worth doing. You hope it's Ramen, it might not be. I think Paul's email
scanner is entirely sensible - I certainly suspect that sendmail et al
would also be good targets for a Ramen-like worm, and there's nothing
like a wolf in sheep's clothing.


> Take the machine offline - physically disconnect it from any networks.
>  If you have any other RedHat machines on a LAN - ensure that they
> haven't been infected too.

And either get all the updates & install them or get a proper distro
(ducks :)


> Only then reconnect to a network and go and get all the errata and
> install them.

I'd do it the other way around. Bring it down. Download the updates (+
MD5 if you're paranoid). Reformat. Re install. Update. Then bring up. 


> Paul, I'm not entirely sure what your email scanner is picking up
> (probably my dodgy mailserver config...). From all the information
> I've read (security portal, redhat, etc, etc) Ramen scans class B
> networks for new hosts - and then attacks suceptable hosts that my -
> not via email.


Yep, Ramen only attacks via ftpd pretty much. People also say it
exploits lpd, but I don't know if that's an entry system for it. It's
most likely that the worm / virus in question is Ramen, but it could be
a variant, you never know. You don't know who's going to have been
messing with it. 

Cheers,

Alex.
---------------------------------------------------------------------
Sheffield Linux User's Group - http://www.sheflug.co.uk
To unsubscribe from this list send mail to
- <sheflug-request [at] vuw.ac.nz> - with the word 
 "unsubscribe" in the body of the message. 

  GNU the choice of a complete generation.