Mailinglist Archive: opensuse (3666 mails)

< Previous Next >
Re: [SLE] My server got hacked? Anyoen seem this?
  • From: Allen <gorebofh@xxxxxxxxxxx>
  • Date: Thu, 10 Mar 2005 23:39:06 -0500
  • Message-id: <20050311043906.GE29886@xxxxxxxxxxxxxxxxxxxxxx>
On Thu, Mar 10, 2005 at 08:31:54PM +0100, Anders Johansson wrote:
> On Thursday 10 March 2005 20:18, Henry Tang wrote:
> > The example i gave is bad. It is more like this
> >
> >
> >l
> >
> > I didn't want to post the email my server was trying to send out because
> > it includes the /etc/passwd file so I posted examples i found on the
> > net. Apprently root tried to send out couple of emails to unknown users
> > of yahoo and other email address as well. The email was bounced and that
> > is how i found out. :( I am not in the competition. :(
> And is your machine a red hat machine?

How would this matter?

> If your machine tries to send out that email, then it does indeed look like
> you have been hacked. The information you give isn't nearly enough to say how
> it was done though.

My machine does this, I'm not rooted.

> What OS is the machine running? Is it patched with all available security
> updates? Which services are you running on it?
> Since the mail was never sent I suspect it hasn't been "owned", but just
> caught by an automated script of some description. I would hazard a guess
> that the log files haven't been cleaned, so you should still be able to find
> traces of how they got in through them.

What if he just hasn't set up sendmail or postfix properly and THAT was why
the mail failed? All they have to do now is set up the mail server and they
get the mail.

> If this machine is in production use, I would recommend that you let someone
> look at it who knows about security.

He pointed out he was only using it for home use and it not a big deal.

> --
> Check the headers for your unsubscription address
> For additional commands send e-mail to suse-linux-e-help@xxxxxxxx
> Also check the archives at
> Please read the FAQs: suse-linux-e-faq@xxxxxxxx

< Previous Next >
Follow Ups