[9320] in bugtraq

home help back first fref pref prev next nref lref last post

Re: No Security is Bad Security:

daemon@ATHENA.MIT.EDU (Kevin Day)
Wed Feb 3 11:14:51 1999

Date: 	Wed, 3 Feb 1999 01:50:20 -0600
Reply-To: Kevin Day <toasty@HOME.DRAGONDATA.COM>
From: Kevin Day <toasty@HOME.DRAGONDATA.COM>
X-To:         jjasen1@UMBC.EDU
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.4.04.9902021820520.24338-100000@linuxbeta.gl.umbc.edu>
              from "John \"E.R.\" Jasen" at "Feb 2, 1999  6:24:25 pm"

>
> Mistakes Made in Incidence Response:
> -----------------------------------
>
> 1) Don't log in as root on a machine that most likely has been
> compromised. Bsd things can happen.
>
> 2) Don't go around blithely executing binaries. (I feel rather stupid
> about that)
>
> 3) Do *immediately* take the machine offline, and mount the disks on
> another system for analysis.


If mounting on another system, and your OS supports it, mount with the
'noexec' option, to make sure you don't accidently infect another system, as
well as the rdonly flag to make sure you don't damage evidence. You may also
want to consider 'noatime', to keep things really pristine, if you don't go
'ro'.

             noexec  Do not allow execution of any binaries on the mounted
                     file system.  This option is useful for a server that has
                     file systems containing binaries for architectures other
                     than its own.



Kevin

home help back first fref pref prev next nref lref last post