[SAC] LDAP user account "steve" compromised
Frank Warmerdam
warmerdam at pobox.com
Wed Aug 7 18:10:18 PDT 2013
Martin,
Details on interacting with LDAP are available at:
http://wiki.osgeo.org/wiki/SAC:LDAP
My process is generally to search for the user with:
https://www.osgeo.org/cgi-bin/auth/ldap_web_search.py
and then reset the password for the user after picking them.
I would be interested in knowing what processes were running where. If
Steve's account is compromised it might make sense to withdraw shell login
access till we work out what happened. Steve is my Google Summer of Code
student for OSGeo4W work.
Best regards,
Frank
On Wed, Aug 7, 2013 at 4:10 PM, Martin Spott <Martin.Spott at mgras.net> wrote:
> Hi, on a system which authenticates against OSGeo LDAP I found
> suspicious processes running under permissions of the user "steve".
> This user definitely needs a new password - do we have a tool to set
> new passwords without directly operating on the LDAP server ?
>
> Cheers,
> Martin.
> --
> Unix _IS_ user friendly - it's just selective about who its friends are !
> --------------------------------------------------------------------------
> _______________________________________________
> Sac mailing list
> Sac at lists.osgeo.org
> http://lists.osgeo.org/mailman/listinfo/sac
>
--
---------------------------------------+--------------------------------------
I set the clouds in motion - turn up | Frank Warmerdam,
warmerdam at pobox.com
light and sound - activate the windows | http://pobox.com/~warmerdam
and watch the world go round - Rush | Geospatial Software Developer
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.osgeo.org/pipermail/sac/attachments/20130807/f23e49c7/attachment.html>
More information about the Sac
mailing list