SLUG Mailing List Archives
[SLUG] Security Breach
- To: <slug@xxxxxxxxxxx>
- Subject: [SLUG] Security Breach
- From: "Sean Carmody" <sean@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Date: Wed Feb 28 11:07:01 2001
Last night I experienced a security breach. I run a small lan with a
ppp dial-up connection that is often left connected. It seems that at
11pm an email containing the output of ifconfig and the contents of
the passwd files was sent by root to 1i0nip@xxxxxxxxx. Luckily the mail
was bounced by our ISP (thanks to the lan's domain name not being found
by the ISP's DNS).
Scouring the log files, the only evidence of this breach I can file
is the log of the attempted mail send in /var/log/maillog and the following
suspicious entry in /var/log/messages:
Feb 28 01:53:07 emu portmap: connect from 22.214.171.124 to
getport(status): request from unauthorized host
This is the only portmap log I've ever had.
Has anyone come across something similar? I've no idea whether this is
the result of a trojan, or whether someone managed to gain access to
my machine (although if they did gain root access, why mail out a passwd
file?). Any thoughts?