Tema: Re: kaip kovojat su isilauzeliais
Autorius: Vidas Makauskas
Data: 2014-09-29 07:21:50
2013-11-18 15:00, Rrr rašė:
> Dropini viska, atidarai tik reikiamus portus [iptables]. Prie SSH ir kitu svarbiu portu leidi tik tam tikrus ip, pvz darbo, namu, savo 3g mobileko interneto subnet'us [iptables]. SSH isjjungi prisijungima rootui ir is viso neleidi jungtis su passwordu, leidi tik paprastiem useriam ir tik savo su cert'u (ant cert turi buti uzdetas pass), kuri pvz nesiojiesi flashiuke [sshd]. Kaip jau kazkas minejo, naudoji fail2ban (principas - pats nurodai kiek leidi prisijungimu per tam tikra laiko tarpa i tam tikra porta/servisa, pvz 3 prisijungimai per 1 min., ant 4 blokuojamas konkretus IP nustatytam laikui ir kiti panasus navarotai).
>
>
>
>
> "Drambliukas" <nera@nera.lt> wrote in message news:l5beek$c0r$1@trimpas.omnitel.net...
>> Sveiki, Fedora (Leonidas), routeris, mailserveris, adresas statinis,
>>
>> Pasipyle loguose IP adresai, kurie bando arba skanuoti root, ssh
>> slaptazodzius arba listi i info@epasta dezute, kuria ismetus fiziskai - vis
>> viena bando skanuot.
>> Kokie aplamai veiksmai tokiu atveju. Kaip kol kas bandau sukovot irasydamas
>> tuos IP adresus i /etc/hosts.deny faila. Bet panasu, kad kova su vejo
>> malunais nes anie pasikeicia IP adresa ir net is kito zemyno.
>> Butu malonu suzinot kaip kovoti
>>
>>
To all Linux users, be aware of the newly uncovered critical 
vulnerability named Shellshock (CVE-2014-6271 and CVE-2014-7169). This 
really is in the same league with recent Heartbleed vulnerability, and 
some people are considering it even a bigger deal. In short, the 
vulnerability allows attacker to execute arbitrary code on any web 
server with bash installed (which makes it 99.9% Linux-based web 
servers, pretty much). What is really scary is that this bug existed in 
all bash versions, including one from 25 years ago. So patch immediately 
because hackers are already using it. Here is a command to help you 
confirm if a system is vulnerable against the Shellshock vulnerability. 
If this outputs a line containing only the word "vulnerable", then you 
are using a vulnerable version of Bash.
$ env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo 
vulnerable' bash -c "echo test"