Results 1 to 5 of 5

Thread: Two Issues - Zombies and Security...

  1. #1
    Senior Member registered user
    Join Date
    Dec 2003
    Location
    Salt Lake City, UT, U.S.A.
    Posts
    1,338

    Two Issues - Zombies and Security...

    As the subject suggests, I have a "two-fold" questions:

    ( 1 ) Zombies - it appears that after running a few days in Knoppix, v3.4, with kernel 2.6.6, I begin to get zombie processes. The one that bugs me the most is a smail process. What appears to happen is, the system boots up a single smail process, and then starts a second smail process, the first process goes zombie, and lists out in a ps -auxww as never using any process / usage time, and shows as <defunct> -=- the hard thing about all of this is, if I kill the <defunct> smail process, within a few minutes, the smail process that was running, goes <defunct> and creates a new smail process... Output of the ps -auxww command is below, has anyone any clues why this is happening, or a resolve???
    Code:
    root      9294  0.0  0.1  2284  996 ?        Ss   09:52   0:00 /usr/sbin/smail -bd -q10m
    root      9295  0.0  0.0     0    0 ?        Zs   09:52   0:00 [smail] <defunct>
    ( 2 ) Security - after reading a System Administrator book on Linux, mostly about Red Hat distro, I am worried about the random acts of security intrusion that someone may decide to "pick on" any system they feel is "fun". I have a firewall program running ( guarddog ), and I have nothing checked in the "receive" from internet, and only what I need on the "sending" checked ( mostly ftp, http, auth, pop3, and smtp )... I have even had someone check my IP address when I enter a chat room, when it shows where I am coming from, and that "address" is showing up as something that isnt even recognizable as an IP address... My question is, even with a firewall, someone can "tunnel" under that firewall, right? I know many "security" posts have been made in this, and the other, forums, but, short of never connecting to the internet, how can one ensure that they are as "secure" as they can be?

    I have gone to the "Shields Up" test site, and most of the time, I just get an error that the site can not display a page, when I ask it to test, is that a good sign?

    Ever since I moved to Linux, through Knoppix, the idea of running my system for days, weeks, and even months, at a time, has been a blessing, but, as I have found out, it isnt when I get zombies showing up, and intrusions ( possible ), though I have yet to find that I have been "picked on" by anyone - cant imagine why, I really dont have anything that interesting on my system anyway...

    Thanks for any advice, ideas, or suggestions, on these matters,
    Ms. Cuddles

  2. #2
    Senior Member
    Join Date
    Nov 2003
    Location
    Washington State
    Posts
    120
    Quote Originally Posted by Cuddles
    As the subject suggests, I have a "two-fold" questions:

    ( 1 ) Zombies - it appears that after running a few days in Knoppix, v3.4, with kernel 2.6.6, I begin to get zombie processes. The one that bugs me the most is a smail process. What appears to happen is, the system boots up a single smail process, and then starts a second smail process, the first process goes zombie, and lists out in a ps -auxww as never using any process / usage time, and shows as <defunct> -=- the hard thing about all of this is, if I kill the <defunct> smail process, within a few minutes, the smail process that was running, goes <defunct> and creates a new smail process... Output of the ps -auxww command is below, has anyone any clues why this is happening, or a resolve???
    Code:
    root      9294  0.0  0.1  2284  996 ?        Ss   09:52   0:00 /usr/sbin/smail -bd -q10m
    root      9295  0.0  0.0     0    0 ?        Zs   09:52   0:00 [smail] <defunct>
    ( 2 ) Security - after reading a System Administrator book on Linux, mostly about Red Hat distro, I am worried about the random acts of security intrusion that someone may decide to "pick on" any system they feel is "fun". I have a firewall program running ( guarddog ), and I have nothing checked in the "receive" from internet, and only what I need on the "sending" checked ( mostly ftp, http, auth, pop3, and smtp )... I have even had someone check my IP address when I enter a chat room, when it shows where I am coming from, and that "address" is showing up as something that isnt even recognizable as an IP address... My question is, even with a firewall, someone can "tunnel" under that firewall, right? I know many "security" posts have been made in this, and the other, forums, but, short of never connecting to the internet, how can one ensure that they are as "secure" as they can be?

    I have gone to the "Shields Up" test site, and most of the time, I just get an error that the site can not display a page, when I ask it to test, is that a good sign?

    Ever since I moved to Linux, through Knoppix, the idea of running my system for days, weeks, and even months, at a time, has been a blessing, but, as I have found out, it isnt when I get zombies showing up, and intrusions ( possible ), though I have yet to find that I have been "picked on" by anyone - cant imagine why, I really dont have anything that interesting on my system anyway...

    Thanks for any advice, ideas, or suggestions, on these matters,
    Ms. Cuddles
    A few things to try:

    ethereal - Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list).

    Code:
    apt-get install ethereal
    acidlab - The Analysis Console for Intrusion Databases (ACID) is a PHP-based analysis engine to search and process a database of security events generated by various IDSes, firewalls, and network monitoring tools.

    Code:
    apt-get install acidlab
    fwatch - Allows you to seamlessly follow the file activity (open, close, stat) by hooking directly into the Linux kernel and reporting every operation to /dev/fwatch. Can help debugging and tuning. Fwatch is distributed as a Linux kernel module.

    Code:
    apt-get install fwatch
    A few tips:

    Persistantly run users to check if anyone new is logging on to your box, if someone is, you should know, and likewise be able to disable any processes they may start. If you find that someone is logging on to your box, try turning off anything like secure shell server that would allow one to remotely loggin.

    You may want to change all your passwords, and ensure that correct permissions are in place for all your /dev devices.

    Run kuser to check group permissions.

    Make sure your zombies aren't being started by init.


    If you still have problems, and can't seem to pin them down, try debian: http://www.debian.org/devel/debian-installer, it's more focused on security and stability than knoppix.

    Meanwhile, check out my desktop: http://www.ncplus.net/~carer2c/img/desktop.png

    Hope I could help you become more paranoid.

  3. #3
    Senior Member registered user
    Join Date
    Dec 2003
    Location
    Salt Lake City, UT, U.S.A.
    Posts
    1,338
    Turbinater,

    Thanks for, what I assume, is information on "security" - I went back to the Gibson site, and did a "Shields Up" test again, this time, "everything" I could test, came back as "Stealth", and "Perfect", so I guess my firewall is set up to block and not report anything back that it shouldn't...

    As for the <defunct> and "zombie" processes - I looked at the man pages for ps, and appears that "most" defunct processes are reported as such when a process "spawns" a subprocess, and doesnt properly shutdown the subprocess correctly - then it becomes a zombie, or <defunct> -=- dont know why I get this with smail though??? Or, why when I kill the smail defunct process, the main process dies, then starts a new smail process and a <defunct> one, again???

    I think my security is ok now, thanks for the information as well, all I need now is this defunct zombie thing to be isolated why it happens...

    Ms. Cuddles
    ADDED:
    As a side note, I created a script called sysstat, run-able only by root user, that performs a combination of system statistics, ps -auxw, netstat -natu, rpcinfo -p, and the users commands to stdout, I might change it to a file, and then maybe create a "program", either in Perl or Python, that interogates the output to what is expected, and then outputs to stdout any discrepencies; like unknown users, defunct processes, established connections, etc... ( that SysAdmin book is paying off, considering the cost was around $45 USD, lots of the above commands, and command line options were taken from its pages )
    END ADDED

  4. #4
    Just a little information if you are interested in some of the ways that one may get around your firewall...

    Firstly, an attacker will need to gain access to your system through methods (known or unknown) in order to consistently go around your firewall... by this I mean, if the attacker gets in, he/she will need to then go through the clean up process so as you dont discover the actions in your logs. This is OK from the attackers point of view to have to do this once, but they dont want to have to do it every time.

    They may then implant a small shell application, similar to netcat, but maybe customised just for them.

    It is fairly easy to place data inside ping packets and many other types of packets that your firewall will see as "normal" traffic and therefore just let it go, but this is very difficult for you to detect unless you are really looking at it hard. As turbinater suggested, you may try etherreal which will enable you to drill right down to the heart of every packet.

    Try not to get too paranoid about it.. it can rule your life, but its good to see that you have noticed the rogue processes and are asking questions about it.

    A thought process that you may like to take into consideration is... I should also look at what is going out through my firewall and how I go about stopping it. To many people are only concerned about what can come in....

    Good luck.

  5. #5
    Senior Member
    Join Date
    Nov 2003
    Posts
    1,323
    I would start at the basics like checking which files are world writable with: find / -perm -2 -type f -print Especially pay attention to ones that are also executable.
    whowatch is another handy tool you can leave running in a shell.
    For rootkits you might want to run chkrootkit or install rkhunter which I prefer.

    Security is a difficult thing. As Mister_Dickens pointed out, it can rule your life, but it's also something I feel strongly about. Just think about last winter when the debian repositories were down due to having been hacked. Surely it's a lot more "glamorous" to hack debian than your homebox, but these were computers set up and checked by the people who understand/wrote the Securing Debian Manual...
    I'm sitting here behind a NATting/stealthed router, an IPtables script and not even cups running unless I need it, and feel confident about one thing only, if someone wants to hack into my computer, they will be able to. It's just a matter of time.

Similar Threads

  1. security issues when using a LiveCD
    By dtux101 in forum Other Live CDs
    Replies: 2
    Last Post: 03-01-2005, 04:00 PM
  2. Hdd Security
    By NetKatz in forum Hdd Install / Debian / Apt
    Replies: 2
    Last Post: 05-02-2004, 02:38 PM
  3. security
    By RNK in forum Customising & Remastering
    Replies: 13
    Last Post: 04-29-2004, 12:37 PM
  4. Security and apt-get
    By Edix in forum Hdd Install / Debian / Apt
    Replies: 1
    Last Post: 11-10-2003, 08:20 PM
  5. security
    By kipizit in forum General Support
    Replies: 1
    Last Post: 11-07-2003, 03:08 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  


Intel Core i7-7800x CPU processor sr3nh 3.50ghz 6-Core 8.25mb lga-2066 X series picture

Intel Core i7-7800x CPU processor sr3nh 3.50ghz 6-Core 8.25mb lga-2066 X series

$57.31



Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc... picture

Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc...

$419.99



Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc... picture

Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc...

$619.99



Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1 picture

Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1

$39.99



Intel Quad Core i3-12100 3.3GHz 12MB LGA1700 12th Gen. CPU Processor SRL62 picture

Intel Quad Core i3-12100 3.3GHz 12MB LGA1700 12th Gen. CPU Processor SRL62

$46.03



AMD Ryzen 5 4500 6-Core 3.6GHz Socket AM4 65W CPU Desktop Processor picture

AMD Ryzen 5 4500 6-Core 3.6GHz Socket AM4 65W CPU Desktop Processor

$79.00



Intel Core i5-13500 65w 14 core Raptor Lake Processor picture

Intel Core i5-13500 65w 14 core Raptor Lake Processor

$162.00



Intel Core i9-13900KF Unlocked Desktop Processor - 24 Cores (8P+16E) & 32 Thread picture

Intel Core i9-13900KF Unlocked Desktop Processor - 24 Cores (8P+16E) & 32 Thread

$539.99



AMD Ryzen 7 7700 Processor (5.3 GHz, 8 Cores, Socket AM5) No Box picture

AMD Ryzen 7 7700 Processor (5.3 GHz, 8 Cores, Socket AM5) No Box

$240.00



AMD Ryzen 5 4500 Processor (3.6 GHz, 6 Cores, Socket AM4) - 100-100000644BOX picture

AMD Ryzen 5 4500 Processor (3.6 GHz, 6 Cores, Socket AM4) - 100-100000644BOX

$69.99