C
chromedome
Guest
We've had issues over the last year or so where we have been playing cat and mouse with php exploits and perl scripts generating massive amounts of spam, filling our quuue's, and making life generally miserable.
Steps we have taken in the past:
Upgrade php
move /tmp to it's own partition and setting up noexec
Installed and regularly run chkrootkit
Installed qmHandle to monitor and clean the queue
We have 2 servers that have gotten hit. One is FreeBSD 5.3, the other is CentOS 3.3, both are running Plesk 7.5.4
Here are my questions:
What is the best way to search out for old/exploitable php scripts?
What is the best way to "lockdown" qmail so that these scripts can not turn the box into a spam-generator
What general "lockdown" recommendations would you add to what we have already done?
Your help is appreciated
Steps we have taken in the past:
Upgrade php
move /tmp to it's own partition and setting up noexec
Installed and regularly run chkrootkit
Installed qmHandle to monitor and clean the queue
We have 2 servers that have gotten hit. One is FreeBSD 5.3, the other is CentOS 3.3, both are running Plesk 7.5.4
Here are my questions:
What is the best way to search out for old/exploitable php scripts?
What is the best way to "lockdown" qmail so that these scripts can not turn the box into a spam-generator
What general "lockdown" recommendations would you add to what we have already done?
Your help is appreciated