Apparently I installed that thing in 2006 and I last updated it in 2016, then I quit updating it for some reason that I totally forgot. Probably laziness…

It’s been running for quite some time and we kind of forgot about it in the closet, until the SSH tunnel we use to get our mail outside our home stopped working because modern openssh clients refuse to use the antiquated key cipher I setup client machines with way back when any longer.

I just generated new keys with a more modern cipher that it understands (ecdsa-sha2-nistp256) and left it running. Because why not 🙂

139 points

Because why not 🙂

Because security.

permalink
report
reply
34 points
*

It’s behind a firewall. The only thing exposed to the outside is port 22 - and only pubkey login too.

And gee dude… It’s been running for 18 years without being pwned 🙂

permalink
report
parent
reply
99 points

It hasnt been pwned so far

permalink
report
parent
reply
12 points

For that matter, it hasn’t been ransomwared. There are so many ways to hide a compromise.

permalink
report
parent
reply
77 points

without being pwned

How do you know?

permalink
report
parent
reply
33 points

There’s a file called /pwnedornot and it contains “no, you’re safe bro”

permalink
report
parent
reply
64 points

And it’s not like it contains any sensitive information. I’m sure all your emails are just friendly correspondence with your pen pal.

permalink
report
parent
reply
33 points

I’d still maybe build a modern OpenSSH package.

There’s been an awful lot of RCEs in the past two decades and uh, if that’s rawdogging the internet, I’m honestly shocked you haven’t been hit with any by now.

permalink
report
parent
reply
3 points

Eh, building anything modern on a system that old would be painful I bet.

Maybe you could use https://github.com/openssh/openssh-portable since that’s meant to be portable. I’d certainly would give it a try if I didn’t want to bother trying to upgrade that system. Then again, trying to upgrade it through the releases to a modern Debian might be fun too.

permalink
report
parent
reply
25 points

How do you know? Do you constantly monitor running processes, performance and network connections?

permalink
report
parent
reply
18 points

sorry, but what kind of email server listens only on SSH?

permalink
report
parent
reply
2 points

The most secure ones

permalink
report
parent
reply
8 points

How do you know? OpenSSH is pretty good but it isn’t impenetrable. Especially for almost 10 years.

permalink
report
parent
reply
6 points

Did you really only use it when you were home? If you used it outside the firewall then port 25 must have been open also.

I used to run my own server and this was in the early 90s. Then one day, perusing the logs I realized I was not smart enough on the security front to even attempt such a thing. It was quickly shut down and the MX record moved to an outsourced mail provider.

permalink
report
parent
reply
-12 points
Deleted by creator
permalink
report
parent
reply
-5 points

Most ‘hackers’ are just mid tier (mediocre) IT level types who rely on existing exploits floating around in the wild. It’d probably be hard to find any still in circulation for such an old system.

permalink
report
parent
reply
23 points
*

We’re not talking about some punch card COBOL machine he jimmy rigged with network access, it’s an Debian 7Linux box with SSH enabled.

It’s not like Metasploit would have a tough time finding unpatched vulnerabilities for it…

permalink
report
parent
reply
2 points

What makes it a even bigger target is the fact that it is a mail server

permalink
report
parent
reply
2 points

It isn’t the “hackers” you should worry about. Its the nation states that take over huge numbers of machines.

permalink
report
parent
reply
4 points

If the NSA (GCHQ here in the UK) want my emails they’re getting it either way, I’m not able to stop nation states

permalink
report
parent
reply
0 points

As a private person, defending against nation threat actors is impossible. And not only as a private person, but even as a medium sized company.

permalink
report
parent
reply
107 points

Good thing there hasn’t been any remotely exploitable security bugs in any of the mail system components in the 6 years since Debian 7 went EoL

permalink
report
reply
18 points

https://security-tracker.debian.org/tracker/

Depending on how it was configured it may or not be have been compromised. Probably better to go the nuclear option.

permalink
report
parent
reply
1 point
*

Why? Then somebody else takes care that it still can send mails

permalink
report
parent
reply
65 points

That was a good test run. I think it’s time to put it into production.

permalink
report
reply
17 points

Everyone has a test environment. Some people also have production environments

permalink
report
parent
reply
44 points

I’m fairly certain that SSH and whatever else you’re exposing has had vulnerabilities fixed since then, especially if modern distros refuse to use the ssh key you were using, this screams of “we found something so critical here we don’t want to touch it”. If your server exposes anything in a standard port, e.g. SSH on 22, you probably should do a fresh install (although I would definitely not know how to rebuild a system I built almost 20 years ago).

That being said, it’s amazing that an almost 20 year old system can work for almost 10 years without touching anything.

permalink
report
reply
11 points

The amount of dos systems I have seen powering critical infrastructure in banks and hospitals is quite frankly nightmare fuel.

permalink
report
parent
reply
13 points

A basic DOS system has zero networking or open ports

permalink
report
parent
reply
7 points

They normally are isolated systems with controlled access. Same with shipping and any other critical industry.

Not to say that there aren’t exceptions but these days there is a required level of compliance

permalink
report
parent
reply
4 points

Remember its what the market determined is the best course of action.

permalink
report
parent
reply
42 points

You send mail to Gmail and Hotmail and it’s actually accepted? How?

permalink
report
reply
40 points

Patience. It really helps to have all the latest set up: SPF, DKIM, DMARC. Then after that it’s a matter of IP reputation, you can email the various blocklists and you wait for the rest of them to clear on their own.

I’ve had that IP for 10 years and it has never sent spam, and I’ve sent enough emails that people open that it actually does get through fine. I haven’t had to think about it for a long time, it just keeps on working. Barely had to even adjust my Postfix config through the upgrades.

permalink
report
parent
reply
6 points

This is true. If you have DMARC and your RUA set up (with a working email (or one that doesn’t bounce at least)) along with SPF and DKIM, Google and MS will accept your mail. The only time it won’t at that point is if your IP is in the same /24 as a known spammer but so long as the spam stops, you’ll fall off the list. Some of the common spamlists allow you to request your IP be removed by request and I can only recall one list that almost nobody uses that makes you pay for the removal though there may be more I don’t recall.

permalink
report
parent
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 9.8K

    Monthly active users

  • 6.1K

    Posts

  • 170K

    Comments