<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Password sniffed; hacked in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175574#M9403</link>
    <description>RH7.1 onwards comes with both IPChains and IPTables.&lt;BR /&gt;&lt;BR /&gt;Prior to RH8 however, IPChains is the default.&lt;BR /&gt;&lt;BR /&gt;You can easy swap these by issuing the following commands:&lt;BR /&gt;&lt;BR /&gt;chkconfig --level 0123456 ipchains off&lt;BR /&gt;service ipchains stop&lt;BR /&gt;chkconfig iptables on&lt;BR /&gt;service iptables start&lt;BR /&gt;&lt;BR /&gt;You will have to translate your firewall rules however.&lt;BR /&gt;&lt;BR /&gt;I'd suggest moving to IPTables as it is by far the better option to use, in both management, and forward-planning.</description>
    <pubDate>Tue, 27 Jan 2004 21:32:39 GMT</pubDate>
    <dc:creator>Stuart Browne</dc:creator>
    <dc:date>2004-01-27T21:32:39Z</dc:date>
    <item>
      <title>Password sniffed; hacked</title>
      <link>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175570#M9399</link>
      <description>Saturday I noticed numerous failed ftp attempts to login to my RedHat 7.1 Apache server. I only noticed one duplicated IP address; all other attempts were from different IP addresses.&lt;BR /&gt;&lt;BR /&gt;Sunday morning, some critical files in /etc were missing; any attempt to do anything produced only error messages on the console.&lt;BR /&gt;&lt;BR /&gt;I reformatted the drives, reinstalled Redhat 7.1 and recovered the server from backups.&lt;BR /&gt;&lt;BR /&gt;Now I'm looking for a way to block ftp and telnet from eth0 (the gateway) while allowing them from eth1 (my lan). I'm using IPchains. Can anyone construct and IP chains entry that would do that ??&lt;BR /&gt;&lt;BR /&gt;Thanks for any help !!</description>
      <pubDate>Tue, 27 Jan 2004 15:00:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175570#M9399</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-01-27T15:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: Password sniffed; hacked</title>
      <link>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175571#M9400</link>
      <description>Your best bet is to use the firewall iptables for the job.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;in /etc/sysconfig/iptables&lt;BR /&gt;&lt;BR /&gt;-A input -i eth0 -p tcp -m tcp --dport 21 -j DROP&lt;BR /&gt;&lt;BR /&gt;This prevents ftp access&lt;BR /&gt;&lt;BR /&gt;You can block services from certain ip addresses or network segments as well&lt;BR /&gt;&lt;BR /&gt;-A INPUT -i eth0 -p ALL -s 192.168.0.15 -j DROP&lt;BR /&gt;&lt;BR /&gt;ipchains:&lt;BR /&gt;&lt;BR /&gt;in the /etc/sysconfig/ipchains file&lt;BR /&gt;&lt;BR /&gt;-A input -s 0/0 23 -d 0/0-p tcp -y -j DROP&lt;BR /&gt;-A input -s 0/0 23 -d 0/0-p tcp -y -j DROP&lt;BR /&gt;&lt;BR /&gt;That will do it.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The reason you probably got hacked was password policy.&lt;BR /&gt;&lt;BR /&gt;One guessable password  makes your system vulnerable.  If that user has a suid capable shell or something out there then your system is someone elses slave. A word starting with a b comes to mind. Bad SEP.&lt;BR /&gt;&lt;BR /&gt;I encountered a number of these attacks on my HP-9000 server.  I used /var/adm/inetd.sec to stop all outside ftp and telnet access&lt;BR /&gt;&lt;BR /&gt;This attack was crude, simply trying to guess the password for root.  There were hundreds of attempts.&lt;BR /&gt;&lt;BR /&gt;I reported the information to the relavent authorities and they promised to investigate.&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Jan 2004 15:21:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175571#M9400</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-01-27T15:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Password sniffed; hacked</title>
      <link>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175572#M9401</link>
      <description>Thanks !!&lt;BR /&gt;&lt;BR /&gt;I don't know if IPTables is on that server; guess I could put it on there. I'll try the Ipchains method first. It gets installed with RedHat 7.1. &lt;BR /&gt; &lt;BR /&gt;-A input -s 0/0 -d 0/0 21 -p tcp -y -j ACCEPT&lt;BR /&gt;-A input -s 0/0 -d 0/0 23 -p tcp -y -j ACCEPT&lt;BR /&gt;&lt;BR /&gt;That is the ipchains entry for telnet and ftp that gets installed with RH 7.1. If I just change the ACCEPT to DROP, how do I get connected from my LAN ?</description>
      <pubDate>Tue, 27 Jan 2004 17:10:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175572#M9401</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-01-27T17:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: Password sniffed; hacked</title>
      <link>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175573#M9402</link>
      <description>Configure this in the inet deamon as this is what is controling these services.&lt;BR /&gt;&lt;BR /&gt;for xinetd only bind these services to the lan interface.&lt;BR /&gt;&lt;BR /&gt;for inetd only allow the services to be available in /etc/hosts.allow to your local LAN This assumes that "ALL: ALL@ALL" is in /etc/hosts.deny to deny everything that falls through /etc/hosts.allow&lt;BR /&gt;&lt;BR /&gt;The above will work as an extra for xinetd if you compiled xinetd from source with tcpwrappers support enabled.&lt;BR /&gt;&lt;BR /&gt;I have an compiled RPM for a recent version xinetd with tcpwrappers built but was built on a 6.2 system.&lt;BR /&gt;&lt;BR /&gt;Regards Ger</description>
      <pubDate>Tue, 27 Jan 2004 21:14:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175573#M9402</guid>
      <dc:creator>ger donohue_1</dc:creator>
      <dc:date>2004-01-27T21:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: Password sniffed; hacked</title>
      <link>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175574#M9403</link>
      <description>RH7.1 onwards comes with both IPChains and IPTables.&lt;BR /&gt;&lt;BR /&gt;Prior to RH8 however, IPChains is the default.&lt;BR /&gt;&lt;BR /&gt;You can easy swap these by issuing the following commands:&lt;BR /&gt;&lt;BR /&gt;chkconfig --level 0123456 ipchains off&lt;BR /&gt;service ipchains stop&lt;BR /&gt;chkconfig iptables on&lt;BR /&gt;service iptables start&lt;BR /&gt;&lt;BR /&gt;You will have to translate your firewall rules however.&lt;BR /&gt;&lt;BR /&gt;I'd suggest moving to IPTables as it is by far the better option to use, in both management, and forward-planning.</description>
      <pubDate>Tue, 27 Jan 2004 21:32:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175574#M9403</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2004-01-27T21:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: Password sniffed; hacked</title>
      <link>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175575#M9404</link>
      <description>Great example Stuart; thanks !!&lt;BR /&gt;&lt;BR /&gt;You've convinced me; I'll switch over to IPTables.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Jan 2004 23:33:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175575#M9404</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-01-27T23:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: Password sniffed; hacked</title>
      <link>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175576#M9405</link>
      <description>I've found that setting up a firewall can be pretty confusing and labourious.&lt;BR /&gt;&lt;BR /&gt;However, I happened across a firewall tool that I found so useful it's the only one I use: shorewall.&lt;BR /&gt;&lt;BR /&gt;It's got very clear documentation on setting up a firewall and comes with loads of examples (including what you're after)...&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.shorewall.net/" target="_blank"&gt;http://www.shorewall.net/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;On top of that, there is webmin (a web based admin interface) and it supports shorewall...&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.webmin.com/" target="_blank"&gt;http://www.webmin.com/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;(Sorry for going a little off topic).&lt;BR /&gt;&lt;BR /&gt;Bottom line is, I knew little about firewalls, but now happily have my linux router up and running using shorewall and suffering almost no external attacks...&lt;BR /&gt;&lt;BR /&gt;HTH.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Jan 2004 06:27:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175576#M9405</guid>
      <dc:creator>Basil_4</dc:creator>
      <dc:date>2004-01-28T06:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: Password sniffed; hacked</title>
      <link>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175577#M9406</link>
      <description>I second the recommendation for shorewall. &lt;BR /&gt;&lt;BR /&gt;Also look at protecting ftp with tcpwrappers, and replacing telnet with ssh.</description>
      <pubDate>Wed, 28 Jan 2004 10:58:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/password-sniffed-hacked/m-p/3175577#M9406</guid>
      <dc:creator>Bill Thorsteinson</dc:creator>
      <dc:date>2004-01-28T10:58:44Z</dc:date>
    </item>
  </channel>
</rss>

