Kamis, 10 April 2014

Bristol Digest, Vol 545, Issue 4

Send Bristol mailing list submissions to
bristol@mailman.lug.org.uk

To subscribe or unsubscribe via the World Wide Web, visit
https://mailman.lug.org.uk/mailman/listinfo/bristol
or, via email, send a message with subject or body 'help' to
bristol-request@mailman.lug.org.uk

You can reach the person managing the list at
bristol-owner@mailman.lug.org.uk

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Bristol digest..."


Today's Topics:

1. Locking and NFS (jpff)
2. vulnerability in Synology (Martin Moore)
3. vulnerability in Synology (Martin Moore)
4. Re: vulnerability in Synology (bblug@gascoigne19.freeserve.co.uk)


----------------------------------------------------------------------

Message: 1
Date: Thu, 10 Apr 2014 17:22:18 +0100
From: jpff <jpff@codemist.co.uk>
To: bristol@mailman.lug.org.uk
Subject: [bristol] Locking and NFS
Message-ID: <9965-Thu10Apr2014172218+0100-jpff@cs.bath.ac.uk>

At least I think that is my problem

Mail is on a Debian machine whose disk is nfs mounted on
OpenSuSE13.1. This has worked for years but following a power problem
(kettle took out sockets) I am having to restore an older 32bit machine
in the debian place (outage blew computer). I read mail from the nfs
disk via emacs. This uses a utility called movemail to rename the
mail file safely -- hence locking. What seems to be happening is that
movemail hangs with master process waiting for a child to exit, while
child gets a lock. Any ideas how to fix? Or what is missing?

Debian system is just upgraded to stable (I think)

==John ffitch

Also having troubles with imap service....



------------------------------

Message: 2
Date: Thu, 10 Apr 2014 20:43:59 +0100
From: "Martin Moore" <martinm@it-helps.co.uk>
To: "'Bristol and Bath Linux User Group'"
<bristol@mailman.lug.org.uk>, <underscore@under-score.org.uk>
Subject: [bristol] vulnerability in Synology
Message-ID:
<!&!AAAAAAAAAAAYAAAAAAAAAFLxZtQqo65Oo+1jhlUB9DvCgAAAEAAAAMyFjqcMEiZCqtLbXacg8DsBAAAAAA==@it-helps.co.uk>

Content-Type: text/plain; charset="us-ascii"



Not sure if anyone's got a Synology Diskstaion - if you have :



There's a vulnerability in Synology (I've been hacked L ) - to see if you've
been hacked open an SSH session and do an ls.



If you get



ERROR: ld.so: object '/lolz/jynx2.so' from LD_PRELOAD cannot be preloaded:
ignored.



You've been got!



There's a updated DSM for it which I'm installing now, but it may need some
manual work to remove the rootkit. Plenty of info if you google the error
line.





Martin.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.lug.org.uk/mailman/private/bristol/attachments/20140410/0ae2b164/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.gif
Type: image/gif
Size: 92 bytes
Desc: not available
URL: <https://mailman.lug.org.uk/mailman/private/bristol/attachments/20140410/0ae2b164/attachment-0001.gif>

------------------------------

Message: 3
Date: Thu, 10 Apr 2014 20:52:51 +0100
From: "Martin Moore" <martinm@it-helps.co.uk>
To: "'Bristol and Bath Linux User Group'"
<bristol@mailman.lug.org.uk>, <underscore@under-score.org.uk>
Subject: [bristol] vulnerability in Synology
Message-ID:
<!&!AAAAAAAAAAAYAAAAAAAAAFLxZtQqo65Oo+1jhlUB9DvCgAAAEAAAAJcQ0pPmRV9InDLDKab0StgBAAAAAA==@it-helps.co.uk>

Content-Type: text/plain; charset="UTF-8"

Not sure if anyone?s got a Synology Diskstation ? if you have :

There?s a vulnerability in Synology (I?ve been hacked ? ) ? to see if you?ve been hacked open an SSH session and do an ls.

If you get

ERROR: ld.so: object '/lolz/jynx2.so' from LD_PRELOAD cannot be preloaded: ignored.

You?ve been got!

There?s a updated DSM for it (I needed to do a manual install - may the hack disables finding new DSM?) which I?m installing now, but it may need some manual work to remove the rootkit. Plenty of info if you google the error line.


Martin.




------------------------------

Message: 4
Date: Thu, 10 Apr 2014 21:33:55 +0100
From: <bblug@gascoigne19.freeserve.co.uk>
To: <martinm@it-helps.co.uk>, "'Bristol and Bath Linux User Group'"
<bristol@mailman.lug.org.uk>, <underscore@under-score.org.uk>
Subject: Re: [bristol] vulnerability in Synology
Message-ID:
<00c201cf54fc$31bfaa10$953efe30$@gascoigne19.freeserve.co.uk>
Content-Type: text/plain; charset="us-ascii"



Could this be related to the 'Heartbleed' vulnerability that was announced
recently?



If not, let's hope the new DSM fixes it fairly quickly.



Martin, do you mind if I forward this to an ARC mailing list I'm part of, as
I know a few members there have Synology units too?



Cheers,



John



From: bristol-bounces@mailman.lug.org.uk
[mailto:bristol-bounces@mailman.lug.org.uk] On Behalf Of Martin Moore
Sent: 10 April 2014 20:44
To: 'Bristol and Bath Linux User Group'; underscore@under-score.org.uk
Subject: [bristol] vulnerability in Synology



Not sure if anyone's got a Synology Diskstaion - if you have :



There's a vulnerability in Synology (I've been hacked :( ) - to see if
you've been hacked open an SSH session and do an ls.



If you get



ERROR: ld.so: object '/lolz/jynx2.so' from LD_PRELOAD cannot be preloaded:
ignored.



You've been got!



There's a updated DSM for it which I'm installing now, but it may need some
manual work to remove the rootkit. Plenty of info if you google the error
line.





Martin.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.lug.org.uk/mailman/private/bristol/attachments/20140410/76d500a4/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.gif
Type: image/gif
Size: 92 bytes
Desc: not available
URL: <https://mailman.lug.org.uk/mailman/private/bristol/attachments/20140410/76d500a4/attachment.gif>

------------------------------

_______________________________________________
Bristol mailing list
Bristol@mailman.lug.org.uk
https://mailman.lug.org.uk/mailman/listinfo/bristol

End of Bristol Digest, Vol 545, Issue 4
***************************************

Tidak ada komentar:

Posting Komentar