openssh vulnerability WITH TCP DUMP!
Damien Miller
djm at mindrot.org
Fri Nov 4 23:17:25 EST 2005
On Fri, 04 Nov 2005 11:54:14 +0100
Evert van de Waal <evert.vandewaal at imtech.nl> wrote:
> Hi Guys,
>
> My Debian box has been hacked a few days ago using an OpenSSH
> vulnerability. Subsequently my box was used for sending spam and as a
> hacking platform (according to my ISP).
How do you know it was an OpenSSH vulnerability? You have provided no
evidence for this theory, indeed quite the opposite.
> The aut.log file shows the following:
> Nov 4 06:25:01 localhost su[5715]: + ??? root:nobody
> Nov 4 06:25:01 localhost su[5715]: (pam_unix) session opened for user
> nobody by
> (uid=0)
OpenSSH doesn't use uid nobody for anything. So, unless you had a bad
password set for your nobody account or you broke your PAM
configuration in some way, it probably wasn't OpenSSH that was used to
break in to your system. Since you didn't actually post any logs of a
break-in (just a later privilege escalation), it is impossible to tell.
> In the auth.log from my hacked box, I also had these lines. However, I
> could not correlate them to TCP messages, so they didn't help me. Now, I
> do have a full tcp dump ;-)
What you posted isn't a tcpdump, it is just a hex packet dump. Have
you gone out of your way to make it hard to read your packet trace? Even
snoop output would have been easier...
> In the dump file, I found three simple messages that did the job:
>
> First: A SYN request to the ssh port
>
> 0000 00 01 80 57 16 3d 00 90 d0 af 86 eb 08 00 45 00 ...W.=.. ......E.
> 0010 00 30 3c 2d 00 00 74 06 1b fd d2 f0 11 2c 0a 00 .0<-..t. .....,..
> 0020 00 82 d6 d3 00 16 7e c1 e4 5f 75 72 0c 80 70 02 ......~. ._ur..p.
> 0030 ff ff d8 83 00 00 02 04 05 b4 01 01 04 02 ........ ......
>
> Next the reply from my box (SYN ACK):
> 0000 00 90 d0 af 86 eb 00 01 80 57 16 3d 08 00 45 00 ........ .W.=..E.
> 0010 00 30 00 00 40 00 40 06 4c 2a 0a 00 00 82 d2 f0 .0.. at .@. L*......
> 0020 11 2c 00 16 d6 d3 55 c4 46 41 7e c1 e4 60 70 12 .,....U. FA~..`p.
> 0030 16 d0 a7 8f 00 00 02 04 05 b4 01 01 04 02 ........ ......
>
> An then the killer. A RST message. The weird ACK (2856040895 according
> to ethereal) seems to be the culprit:
> 0000 00 01 80 57 16 3d 00 90 d0 af 86 eb 08 00 45 00 ...W.=.. ......E.
> 0010 00 28 a3 31 40 00 34 06 b5 00 d2 f0 11 2c 0a 00 .(.1 at .4. .....,..
> 0020 00 82 d6 d3 00 16 7e c1 e4 60 00 00 00 00 50 04 ......~. .`....P.
> 0030 00 00 87 36 00 00 00 00 00 00 00 00 ...6.... ....
This is not an attack on OpenSSH, it looks like a type of stealth
portscan that completes enough of the 3-way handshake to avoid synproxy
devices but not enough to activate daemons (thereby leaving spoor in
the logs). Someone more interested could probably match it back to one
of nmap's modes.
BTW ethereal reported the wrong ack sequence number (or you transposed
it wrong).
-d
More information about the openssh-unix-dev
mailing list