Opened 13 years ago

Closed 13 years ago

#738 closed defect (fixed)

LDAP logins to Projects VM failing

Reported by: warmerdam Owned by: sac@…
Priority: critical Milestone:
Component: SysAdmin Keywords: ProjectsVM LDAP
Cc: martin, Jeff McKenna, dmorissette

Description

It seems that LDAP logins to the project VM have stopped working. I believe this was first observed on July 12th or so (jmckenna) and I have confirmed this (warmerdam). Martin is apparently looking into the problem without it being immediately obvious what is wrong.

Change History (9)

comment:1 by dmorissette, 13 years ago

Cc: dmorissette added

comment:2 by martin, 13 years ago

Priority: majorcritical

It's working again, but I wonder why the person behind the user account 'crschmidt' has installed a custom SSH server binary last Saturday .... If Chris Schmidt himself didn't, then we should consider the 'projects' VM as being compromised and _everyone_ who has tried password authentication on the 'projects' VM, I repeat: _everyone_ is urged to change his LDAP password.

comment:3 by crschmidt, 13 years ago

No, I did not do this. Presumably my account was compromised in some way. (My password is relatively strong, and I only use it for OSGeo-related activities, so I'm not sure how my account was compromised; I'd apologize, but at this point it doesn't seem like it would do much good.)

comment:4 by martin, 13 years ago

Ok, all binaries in /bin/, /sbin/, /usr/bin/, /usr/sbin/ as well as all libraries which are linked from SSH binaries do _not_ look suspicious. With a little bit of luck we're done by everybody in the "telascience" shell group changing their LDAP passwords if they tried to log into the 'projects' VM recently (since Saturday). Everybody !!

comment:5 by tmitchell, 13 years ago

Does this affect shared key authorization for crschmidt under root accounts on other VMs? Just wondering if we should pull any of those keys, if they exist.

comment:6 by crschmidt, 13 years ago

No, that key is only on my laptop, and from what I can tell, the machine which was compromised was my webserver. So I don't think that we need to worry about anyone having access to the private key for one of the root accounts.

comment:7 by tmitchell, 13 years ago

Okay, that makes sense. I was thinking more that if the shared key on the servers was changed (or anyone other keys changed), it would give another easy way to log in without needing your private one.

comment:8 by crschmidt, 13 years ago

Martin checked out a number of things on that server (including the root authorized_keys) and found no other modifications / additions; it looks like we have a full log of the things that were done to the system, and it was just changing the SSH daemon to the manually copied in one. I think the most important part now is just to get everyone with shell access who has logged in since Saturday to change their passwords, so I'll send out an email tonight to everyone in the shell group with this information.

comment:9 by wildintellect, 13 years ago

Resolution: fixed
Status: newclosed
Note: See TracTickets for help on using tickets.