[57526] in Hotline Meeting

home help back first fref pref prev next nref lref last post

Re: Case 246871: This case has recently been updated

daemon@ATHENA.MIT.EDU (Ruaidhri O'Connor)
Wed Dec 5 00:49:50 2001

Message-Id: <200112050549.AAA19294@m1-142-7.mit.edu>
To: Mark Silis <mark@MIT.EDU>
cc: hotline@MIT.EDU, network@MIT.EDU, larugsi@MIT.EDU
In-Reply-To: Your message of "Wed, 05 Dec 2001 00:08:48 EST."
             <20011205000848.A10143@I-fear-reorgs.MIT.EDU> 
Date: Wed, 05 Dec 2001 00:49:47 -0500
From: "Ruaidhri O'Connor" <rmoc@MIT.EDU>

Hi,

 I have contacted security who informed me that
because of a security breach on my machine the net drop
will remain offline until I have reinstalled a secure OS.
I am taking these steps tonight.

Thank you for you help in identifying the problem.
The person I communicated with last was "Linda A. LeBlanc" <leblancl@MIT.EDU>

Below is our communication.

- Rory

>---------------------------------------------------
>Ruaidhri M. O'Connor, ScD
>Assistant Professor
>Dept. Civil & Environmental Engineering
>Massachusetts Institute of Technology, Room 1-174
>Cambridge, MA 02139
>USA
>
>Phone: 1-617-482-3395
>Fax:   1-617-253-6324
>email: rmoc@mit.edu
>---------------------------------------------------


Hi Prof. O'Connor

I just have a couple of questions about the
circumstances surrounding your compromise.
I am not completely familiar with the case and
would like for you to clarify a couple of things
for me if possible.

I only have evidence of knowledge of a compromise
dating from 1 Dec. We currently list an  Anthee
Travers as a contact for this machine. He or she
was notified at approximately 2 am on 1 Dec.
Why this information was not relayed to you,
we don't know.  If you wish to have the contact
information changed to your name, let me know
and I'll fix it.

You make a reference to an
outside complaint wherein you told them
they had been compromised.  Could you explain
the details of this exchange for me, so that
we can improve our reporting and forensics
procedures?

When you have completed the reinstallation of
zmb.mit.edu, please let us know and we will
reenable your drop.

Thank you for your timely cooperation in this
matter, and for helping us understand the
route this compromise has taken.

If you have any other questions or concerns
please let me know, and we'll get them worked
out.

Linda LeBlanc for security@mit.edu

PS. Please be sure to include the case
number in the subject line.



--------------------------------------------------------------

Dear Linda,

 Thanks for your response. I will contact my AO to determine
why I was not informed of the network deactivation. 
It certainly appears that someone dropped the ball on my end
regarding notification. Sorry for the confusion.

Regarding the outside complaint: 

When the breakin occurred I traced the access point to datapipe.net
I sent email to them and security but it appears that I sent my email
to the wrong address (I do not use my linux box for mail and did not
notice the failure to get the note to you). I was also out of the 
loop that week in the infirmary which obfuscated the matter even more
(i.e. the person was unhindered for several days over the break).

The breach involved the ssh CRC32 crack (which I am now aware of).
The person installed a directory at the root level called salvia
which contained code to install a kernel module and enable a
transparanet TCP backdoor to my system. I believe I disabled this
on discovery but as you note, a complete reinstall in required to 
ensure hygeine.

The source code included the names Salvia Divinorum (sic)
and references the sites: www.ezlink.com/		- an ISP in CO
and references the sites: www.ezlink.com/		- an ISP in CO
			  mixter.warrior2k.com		- a security site

I still have the message logs and salvia directory if they are of any
use. My kernel was certainly corrupted as was evident from the dmesg
log. 

     Regards,

     - Ruaidhri

Here is a summary of what I looked up:

Nov 23 10:06:57 zmb sshd[19832]: fatal: Local: crc32 compensation
attack: network attack detected 
Nov 23 10:06:57 zmb sshd[19833]: log: Connection from 64.27.88.120
port 3666 
Nov 23 10:06:57 zmb sshd[19833]: log: Could not reverse map address
64.27.88.120 

and traceroute:

traceroute to 64.27.88.120 (64.27.88.120), 30 hops max, 38 byte packets
 1  B24-RTR-2-1.MIT.EDU (18.58.0.1)  0.354 ms  0.672 ms  0.270 ms
 2  EXTERNAL-RTR-BACKBONE.MIT.EDU (18.168.0.18)  3.833 ms  2.394 ms
    2.339 ms 
 3  ATM10-420-OC12-GIGAPOPNE.NOX.ORG (192.5.89.9)  3.457 ms  2.526 ms
    2.137 ms 
 4  QWEST-GIGAPOPNE.NOX.ORG (192.5.89.66)  212.899 ms  199.788 ms
    199.633 ms 
 5  bos-core-02.inet.qwest.net (205.171.28.33)  190.542 ms  190.379 ms
    187.746 ms 
 6  jfk-core-02.inet.qwest.net (205.171.8.20)  196.260 ms  206.010 ms
    197.362 ms 
 7  jfk-core-03.inet.qwest.net (205.171.230.10)  187.371 ms  195.605
    ms  198.896 ms 
 8  ewr-core-03.inet.qwest.net (205.171.5.89)  202.440 ms  200.039 ms
    181.506 ms 
 9  ewr-cntr-02.inet.qwest.net (205.171.17.150)  189.545 ms  196.603
    ms  188.872 ms 
10  msfc-22.ewr.qwest.net (63.146.100.42)  195.966 ms  183.968 ms
    189.321 ms 
11  core1.ewr.datapipe.net (63.236.25.174)  179.958 ms  198.735 ms
    201.385 ms 
12  aggr1.ewr.datapipe.net (216.109.128.11)  196.848 ms  193.181 ms
    190.099 ms 
13  64.27.88.120 (64.27.88.120)  195.026 ms  187.384 ms  196.066 ms

home help back first fref pref prev next nref lref last post