<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Server compromised in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504109#M745071</link>
    <description>George,&lt;BR /&gt;Have a GOOD look at your /etc/passwd file&lt;BR /&gt;From the symptoms, it sounds like it's either been deleted or nullified. At the very least, some users (including root) have been removed from it.&lt;BR /&gt;&lt;BR /&gt;I assume you must have an old root session logged on since before this happened. Don't log off until you have recovered the passwd file.&lt;BR /&gt;Obviously, also check what other files may be missing/compromised.&lt;BR /&gt;Good luck</description>
    <pubDate>Mon, 14 Mar 2005 11:35:31 GMT</pubDate>
    <dc:creator>Gordon  Morrison</dc:creator>
    <dc:date>2005-03-14T11:35:31Z</dc:date>
    <item>
      <title>Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504106#M745068</link>
      <description>Hi it seems as if someone has been playing on one of my backup servers over the weekend.&lt;BR /&gt;&lt;BR /&gt;logged in as root and received intruder alert at the prompt and root seems to have lost a lot of its permissions.&lt;BR /&gt;&lt;BR /&gt;Whoami for any user bring up this intruder alert userid.&lt;BR /&gt;&lt;BR /&gt;the userid isnt in the passwd file and root's .profile has not been changed.&lt;BR /&gt;&lt;BR /&gt;I've took the server off the lan and checked the yslog and sulog but nothing of any use in there (this is an untrusted v11 system)&lt;BR /&gt;&lt;BR /&gt;Any ideas on where i start on this.&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;&lt;BR /&gt;George</description>
      <pubDate>Mon, 14 Mar 2005 11:26:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504106#M745068</guid>
      <dc:creator>George_Dodds</dc:creator>
      <dc:date>2005-03-14T11:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504107#M745069</link>
      <description>Check the permissions on your /etc/passwd file and the permissions on all other files.  You could try swverify to check.&lt;BR /&gt;&lt;BR /&gt;/etc/passwd permissions should be 444 (-r--r--r--) and if it is not you can see error messages similar to what you are seeing.</description>
      <pubDate>Mon, 14 Mar 2005 11:33:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504107#M745069</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2005-03-14T11:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504108#M745070</link>
      <description>This generally means that the password file is goofed up because some needed user id isn't in the /etc/password file.&lt;BR /&gt;&lt;BR /&gt;Check permissions of /etc and /etc/password and overall password file (i.e. copy it onto system from a backup).&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 14 Mar 2005 11:34:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504108#M745070</guid>
      <dc:creator>Kent Ostby</dc:creator>
      <dc:date>2005-03-14T11:34:39Z</dc:date>
    </item>
    <item>
      <title>Re: Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504109#M745071</link>
      <description>George,&lt;BR /&gt;Have a GOOD look at your /etc/passwd file&lt;BR /&gt;From the symptoms, it sounds like it's either been deleted or nullified. At the very least, some users (including root) have been removed from it.&lt;BR /&gt;&lt;BR /&gt;I assume you must have an old root session logged on since before this happened. Don't log off until you have recovered the passwd file.&lt;BR /&gt;Obviously, also check what other files may be missing/compromised.&lt;BR /&gt;Good luck</description>
      <pubDate>Mon, 14 Mar 2005 11:35:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504109#M745071</guid>
      <dc:creator>Gordon  Morrison</dc:creator>
      <dc:date>2005-03-14T11:35:31Z</dc:date>
    </item>
    <item>
      <title>Re: Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504110#M745072</link>
      <description>passwd file permissions are 444</description>
      <pubDate>Mon, 14 Mar 2005 11:52:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504110#M745072</guid>
      <dc:creator>George_Dodds</dc:creator>
      <dc:date>2005-03-14T11:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504111#M745073</link>
      <description>On an 11.00 system a false alarm can be triggered by the root filesystem getting full.&lt;BR /&gt;&lt;BR /&gt;That can compress /etc/group or /etc/passwd to zero bytes. &lt;BR /&gt;&lt;BR /&gt;Its also possible someone has been playing.&lt;BR /&gt;&lt;BR /&gt;I'd recommend a thorough check of the system, including a scan for back doors.&lt;BR /&gt;&lt;BR /&gt;A back door can be a copy of the shell with suid set on it. Consultants and miscreants commonly set such trapdoors so they can get in again in the future.&lt;BR /&gt;&lt;BR /&gt;I'd also recommend a commerical program called tripwire.&lt;BR /&gt;&lt;BR /&gt;It monitors binaries and configuration and can alert you of unauthorized changes. Hackers will often substitute their own programs for normal commands. Their programs will install back doors and do all kinds of bad things.&lt;BR /&gt;&lt;BR /&gt;Finally, I'd get Bastille onto this system and harden it.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 14 Mar 2005 11:59:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504111#M745073</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-03-14T11:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504112#M745074</link>
      <description>George .. you need to also check the permissions of / and /etc as well as viewing the file via more or cat to see if it looks "reasonable".&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 14 Mar 2005 12:07:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504112#M745074</guid>
      <dc:creator>Kent Ostby</dc:creator>
      <dc:date>2005-03-14T12:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504113#M745075</link>
      <description>Had a similar problem in a past life when someone edited /etc/passwd and had some difficulty remembering how to get out. Kinda obvious since the first line started with ":qot:0:". Since then, I've put a dummy user as the first line in all my /etc/passwd files so the root entry won't get clobbered in a case like this. &lt;BR /&gt;Yeah, Yeah, I know he should have used "vipw" but sometimes it's hard to protect against managers that insist on showing off their "vo skills".    8-)</description>
      <pubDate>Mon, 14 Mar 2005 13:24:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504113#M745075</guid>
      <dc:creator>S.Rider</dc:creator>
      <dc:date>2005-03-14T13:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504114#M745076</link>
      <description>Right there is a possibility that the root permissions problem could be down to a duff passwd synching script on another server.&lt;BR /&gt;&lt;BR /&gt;But i cant explain the root prompt change and the response from whoami for all users.&lt;BR /&gt;&lt;BR /&gt;The exact prompt is &lt;BR /&gt;&lt;BR /&gt;Intruder Alert.@servername&lt;BR /&gt;&lt;BR /&gt;There is an old version of tripwire on this server but i havent read anything that says it would throw up an alert in this way.&lt;BR /&gt;&lt;BR /&gt;With a bit of luck it may just be down to a duff script but i'm using it as an excuse to moved to a more secure setup. &lt;BR /&gt;&lt;BR /&gt;Any ideas on the prompt issue?&lt;BR /&gt;&lt;BR /&gt;Ta&lt;BR /&gt;&lt;BR /&gt;George</description>
      <pubDate>Tue, 15 Mar 2005 03:22:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504114#M745076</guid>
      <dc:creator>George_Dodds</dc:creator>
      <dc:date>2005-03-15T03:22:51Z</dc:date>
    </item>
    <item>
      <title>Re: Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504115#M745077</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Document id: BH9104032020&lt;BR /&gt;&lt;A href="http://www4.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&amp;amp;docId=200000007949869" target="_blank"&gt;http://www4.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&amp;amp;docId=200000007949869&lt;/A&gt;&lt;BR /&gt;(ancient document, I know)&lt;BR /&gt;but it states that a system under certain circumstances of changed file permissions may display "Intruder alert" instead of the user's name. Perhaps the .profile could be responsible for the rest of the prompt.&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;John K.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Mar 2005 03:47:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504115#M745077</guid>
      <dc:creator>john korterman</dc:creator>
      <dc:date>2005-03-15T03:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: Server compromised</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504116#M745078</link>
      <description>Figured it out, the script that updates the passwords from 1 server to the affected server for some reason put a blank line at the top of the passwd file.&lt;BR /&gt;&lt;BR /&gt;As soon as this is done the kernel must spit out the intruder alert warning at the prompt.&lt;BR /&gt;&lt;BR /&gt;I deleted the blank line and all is back to normal.&lt;BR /&gt;&lt;BR /&gt;At least i learnt something new today :)</description>
      <pubDate>Tue, 15 Mar 2005 06:07:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/server-compromised/m-p/3504116#M745078</guid>
      <dc:creator>George_Dodds</dc:creator>
      <dc:date>2005-03-15T06:07:21Z</dc:date>
    </item>
  </channel>
</rss>

