user account disappeared

J. Hellenthal jhellenthal at dataix.net
Sun Feb 28 00:13:51 UTC 2021


Also 

ls -l /etc/*pass*

Should show you those. Appears you’ve missed them.

-- 
 J. Hellenthal

The fact that there's a highway to Hell but only a stairway to Heaven says a lot about anticipated traffic volume.

> On Feb 27, 2021, at 15:23, Gareth de Vaux <security at lordcow.org> wrote:
> 
> Hi all, one of my users in a jail has mysteriously half disappeared. I've renamed the user to 'lostuser', the password hash, and the process it's running to protect privacy below:
> 
> I suddenly can't log in over ssh:
> 
> sshd[22485]: Invalid user lostuser from XYZ
> 
> # su - lostuser
> su: unknown login: lostuser
> 
> # ls -ld /home/lostuser
> drwx------  8 1012  users  18 Jan 23 11:19 /home/lostuser
> 
> $HOME still exists but only showing the userid.
> 
> # egrep "1012|lostuser" /etc/passwd
> lostuser:*:1012:1000:User &:/home/lostuser:/usr/local/bin/bash
> 
> # egrep "1012|lostuser" /etc/master.passwd 
> lostuser:$6$9xxxxx/:1012:1000::0:0:User &:/home/lostuser:/usr/local/bin/bash
> 
> Entries are still in /etc/*passwd ?
> 
> # ls -l /etc/*passwd /etc/group
> -rw-r--r--  1 root  wheel   605 Nov  6 16:52 /etc/group
> -rw-------  1 root  wheel  4092 Jan 23 12:22 /etc/master.passwd
> -rw-r--r--  1 root  wheel  2621 Jan 23 12:22 /etc/passwd
> 
> This process is still running, which is a network server which is still functioning:
> 
> # ps aux | grep lostuser
> 1012      56261  0.0  0.1   44952   21288  7  S+J   3Dec20    9:52.21 /usr/local/bin/python3.6 /home/lostuser/xyz
> 
> also obviously showing the userid and not the username.
> 
> 
> # grep lostuser /var/log/auth.log
> ...
> Dec 31 10:56:34 ns1 sshd[43798]: Accepted publickey for lostuser from xyz
> Dec 31 10:56:57 ns1 sshd[44133]: Disconnected from user lostuser
> Jan 10 09:37:05 ns1 sshd[9679]: Accepted publickey for lostuser from xyz
> Jan 10 09:37:09 ns1 sshd[10241]: Disconnected from user lostuser
> Jan 23 11:19:11 ns1 sshd[45905]: Accepted publickey for lostuser from xyz
> Jan 23 11:19:14 ns1 sshd[46228]: Disconnected from user lostuser
> Feb 27 18:06:49 ns1 sshd[93323]: Invalid user lostuser from xyz
> Feb 27 18:06:49 ns1 sshd[93323]: Connection closed by invalid user lostuser xyz
> 
> 23 Jan 2021 was the last successful login, and later that day /etc/*passwd was touched due to me changing the
> password of a different user, confirmed as the only change from diff'ing against backups.
> 
> Last buildworld upgrade on 3 Nov 2020 (host and jail):
> 
> $ uname -a
> FreeBSD ns1.lordcow.org 11.4-STABLE FreeBSD 11.4-STABLE #0 r367290: Tue Nov  3 12:11:29 SAST 2020     root at lordcow.org:/usr/obj/usr/src/sys/GENERIC  amd64
> 
> The last ports upgrade was 13 Feb 2021, before that I'm not sure.
> 
> The last entry in /var/log/userlog was 23 Jul 2020, and:
> 
> # ls -l /var/log/userlog 
> -rw-------  1 root  wheel  4202 Jul 23  2020 /var/log/userlog
> 
> 
> ie. timeline:
> 
> 23 Jul 2020 Last userlog change
> 3  Nov 2020 buildkernel/buildworld and reboot
> 3  Dec 2020 lostuser network server process spawned and still functioning
> 23 Jan 2021 Last successful login to lostuser
> 23 Jan 2021 Unrelated user's password intentionally changed with passwd
> 13 Feb 2021 ports upgrade
> 27 Feb 2021 Discover user doesn't exist anymore but still has entries in /etc/*passwd and a process running
> 
> Any ideas?
> _______________________________________________
> freebsd-security at freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscribe at freebsd.org"


More information about the freebsd-security mailing list