SSH issues...

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Thomas Mondoshawan Tate
Date:  
Subject: SSH issues...
--OgqxwSJOaUobr8KG
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Tue, Dec 04, 2001 at 06:43:24PM -0800, Lowell Hamilton wrote:
> That has the signature of an exploited machine. I have seen several of
> these with the same issues. When people exploit the CRC-32 ssh hole,
> the rootkits disable ssh to keep others from using the same exploit,
> and it has the affect of locking legit users out as well. I'm not
> saying it's guaranteed to be it, but it is possible. If you used any
> redhat distribution or several others they come default with an old
> (pre v2.9) OpenSSH which is vulnerable.
>=20
> Lowell


I built this machine from the ground up from source copies of the latest
distributions of each package. I'm running OpenSSH_3.0p1, with protocols
1.5/2.0. The system was just recently installed to the outside world a few
seconds ago, so it's not possible for it to be rooted this early. =3Dop

--=20
Thomas "Mondoshawan" Tate

http://tank.dyndns.org

--OgqxwSJOaUobr8KG
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8DYu+Yp5mUsPGjjwRAveEAKC3OZFb6z+mMyGUpL8c8hD149QkOwCfczGU
m3b3CeKPAabufFQg9/dMtQM=
=qpz8
-----END PGP SIGNATURE-----

--OgqxwSJOaUobr8KG--