On Thu, Mar 10, 2005 at 08:31:54PM +0100, Anders Johansson wrote:
On Thursday 10 March 2005 20:18, Henry Tang wrote:
The example i gave is bad. It is more like this
http://www.derkeiler.com/Newsgroups/comp.os.linux.security/2003-06/0473.htm l
I didn't want to post the email my server was trying to send out because it includes the /etc/passwd file so I posted examples i found on the net. Apprently root tried to send out couple of emails to unknown users of yahoo and other email address as well. The email was bounced and that is how i found out. :( I am not in the competition. :(
And is your machine a red hat machine?
How would this matter?
If your machine tries to send out that email, then it does indeed look like you have been hacked. The information you give isn't nearly enough to say how it was done though.
My machine does this, I'm not rooted.
What OS is the machine running? Is it patched with all available security updates? Which services are you running on it?
Since the mail was never sent I suspect it hasn't been "owned", but just caught by an automated script of some description. I would hazard a guess that the log files haven't been cleaned, so you should still be able to find traces of how they got in through them.
What if he just hasn't set up sendmail or postfix properly and THAT was why the mail failed? All they have to do now is set up the mail server and they get the mail.
If this machine is in production use, I would recommend that you let someone look at it who knows about security.
He pointed out he was only using it for home use and it not a big deal.
-- Check the headers for your unsubscription address For additional commands send e-mail to suse-linux-e-help@suse.com Also check the archives at http://lists.suse.com Please read the FAQs: suse-linux-e-faq@suse.com