Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Encryption Software Linux

Compromised SSH Keys Lead To Linux Rootkit Attack 79

Tech Groupie writes "The US Computer Emergency Readiness Team (CERT) has issued a warning for what it calls 'active attacks' against Linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access to a system, and then uses local kernel exploits to gain root access. Once root access has been obtained, a rootkit known as 'phalanx2' is installed."
This discussion has been archived. No new comments can be posted.

Compromised SSH Keys Lead To Linux Rootkit Attack

Comments Filter:
  • As usual... (Score:4, Informative)

    by koh ( 124962 ) on Wednesday August 27, 2008 @10:24AM (#24765043) Journal

    Change your keys regularly, and revoke the key as soon as you have the slightest doubt it's been compromised.

  • and (Score:4, Informative)

    by extirpater ( 132500 ) on Wednesday August 27, 2008 @10:27AM (#24765091)

    change your ports other than 22, this won't stop a full port scan but good against lamers scanning for port 22.
    And you ip restriction. if you don't have static ip at least block connections outside of your connected isp.
    you may also use port knocking protection.
    these are not panacea but better than nothing.

  • Re:Oh noes!!1! (Score:5, Informative)

    by Goaway ( 82658 ) on Wednesday August 27, 2008 @10:34AM (#24765209) Homepage

    If you generated that key with Debian within the last two years, anybody can figure it out in minutes, remotely.

  • Re:Oh noes!!1! (Score:5, Informative)

    by GiMP ( 10923 ) on Wednesday August 27, 2008 @10:45AM (#24765379)

    What it means is that there are apparently some administrators not running Debian that have naively thought that the issue didn't affect them. However, if they haven't blacklisted those keys, they will undoubtedly have some users that generated their keys on Debian, which are vulnerable.

    The worm will exploit this to obtain local non-root user access, and through local privilege escalation exploits will obtain root. Then, they will steal the keys stored on the host that might be used to connect out to other hosts. The last part of this is the deadly part, because those keys are not blacklisted, and will thus connect to and infect the hosts that don't have vulnerable-old-debian keys.

    What this means for me, as the administrator of a web hosting company that has patched their servers, is that we will undoubtedly see illicit login attempts. With some really bad luck, one of those login attempts might work, despite our patching. Then, we are at the whim of how well we're secure against local privilege escalation.

  • Re:How is this news? (Score:3, Informative)

    by Goaway ( 82658 ) on Wednesday August 27, 2008 @11:12AM (#24765829) Homepage

    No, I just actually read the article.

    Details on the attacks â" and targets â" remain scarce but itâ(TM)s a safe bet this is linked to the Debian random number generator flaw that surfaced earlier this year. A working exploit for that vulnerability is publicly available.

  • Re:Oh noes!!1! (Score:5, Informative)

    by Chatterton ( 228704 ) on Wednesday August 27, 2008 @11:54AM (#24766493) Homepage

    With the exploit, breaking the key is a matter of minutes. The worm could try to crack them all hoping to find one generated on a debian box and not updated.

  • Deny-hosts (Score:3, Informative)

    by johndmartiniii ( 1213700 ) on Wednesday August 27, 2008 @02:24PM (#24768667) Homepage
    I've been using a package called DenyHosts for about 2 months now. It's in the Debian repos. It just reads the auth.log file and blocks ssh login attempts based on the parameters that you set. It's cut back on my login attempts by about 40% since I started playing with it. It helps a great deal even if you are doing password-less logins, because it will block based on the user, whether it is valid or not, root login attempt, et al. denyhosts.sourceforge.net [sourceforge.net] It's worth looking into as an extra layer of security.
  • Use DenyHosts (Score:2, Informative)

    by metallurge ( 693631 ) <metallurge@@@gmail...com> on Wednesday August 27, 2008 @05:05PM (#24770529)
    DenyHosts [sourceforge.net] is a handy little script that watches your ssh port, looking for brute force/dictionary attack attempts. Then it blacklists those IP addresses. You can also set it up to share your blacklist with others, and/or to update your own blacklist with what other users have found.
  • Re:How is this news? (Score:2, Informative)

    by ozphx ( 1061292 ) on Wednesday August 27, 2008 @10:52PM (#24774431) Homepage

    It was worse. The only entropy was the process ID.

    That means the *likely* seed for longer running system processes was in a subset of the low couple of thousand.

    For user processes, well starting low and ending higher would eat up keys like no tommorow. One researcher successfully made an exhaustive scan in around 48 hours on a small cluster :S

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...