* * * * *

                      “I have a bad feeling about this.”

On Monday (which I didn't report), I went to Atlantic Internet [1] to do some
consulting. One of the salespeople there is involved in some projects and I
was brought in to help.

While there, the box being used, a RedHat 6.0 distribution, appeared to have
been compromised. No like my roommate's box [2] but still, syslogd wasn't
running like it should, and there appeared to be an abnormal amount of
httpd's running, but it's a webserver so I didn't think anything of it.

I shut off ftpd and added entries to /etc/hosts.allow and /etc/hosts.deny
until it could be patched up or upgraded.

Fast forward to today (way early or way late, take your pick) and I'm reading
Slashdot [3] when I come across the article [4] about some recent DoS attacks
against some very large sites. In the discussion, I follow one of the links
to an analysis of stacheldraht, [5] a program that is suspected to have been
used in the DoS. And the code seems to have been written for Solaris 2.x and
Linux, specifically the RedHat 6.0 distribution.

> Like TFN, C macros ("config.h") define values used for expressing commands,
> replacement argument vectors ("HIDEME" and "HIDEKIDS") to conceal program
> names, etc.:
>
> -----[ C ]-----
> #ifndef _CONFIG_H
>
> /* user defined values for the teletubby flood network */
>
> #define HIDEME "(kswapd)"
> #define HIDEKIDS "httpd"
> #define CHILDS 10
> -----[ END OF LINE ]-----
>

The box in question, like I stated, is a RedHat 6.0. What I haven't mentioned
is that it's sitting behind a T3. And there were an abnormally large number
of httpd's running.

I have a bad feeling about this.

[1] http://www.aibusiness.net/
[2] gopher://gopher.conman.org/0Phlog:2000/01/30.1
[3] http://slashdot.org/
[4] http://slashdot.org/article.pl?sid=00/02/08/0344217&mode=flat
[5] http://staff.washington.edu/dittrich/misc/stacheldraht.analysis

Email author at [email protected]