Forums

Skip to content

Advanced search
  • Quick links
    • Unanswered topics
    • Active topics
    • Search
  • FAQ
  • Login
  • Register
  • Board index Assistance Networking & Security
  • Search

i got hacked. what were they up to?

Having problems getting connected to the internet or running a server? Wondering about securing your box? Ask here.
Post Reply
Advanced search
443 posts
  • Page 11 of 18
    • Jump to page:
  • Previous
  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • 18
  • Next
Author
Message
Sysa
Apprentice
Apprentice
User avatar
Posts: 161
Joined: Wed Mar 16, 2005 8:52 am
Location: Europe

  • Quote

Post by Sysa » Wed Mar 16, 2005 11:34 am

Determined wrote:Do you ssh this box from the internet? I hope there is a good reason to have open ports like that.

The moral of the story really: Strong passwords, hardware firewall, encrypt all network traffic possible.

"... hardware firewall ..." - :lol: . I do not think it saves you but you'll not see and control the situation!!
RedHat -> SuSE -> Debian -> Gentoo
Top
Veronika
n00b
n00b
Posts: 5
Joined: Wed Mar 16, 2005 4:28 pm
Location: Europe
Contact:
Contact Veronika
Website

  • Quote

Post by Veronika » Thu Mar 17, 2005 3:21 pm

Bcore,

thanks for bringing up this topic. I´m kind of what you have been until this happened to you: a trusting user and installer, not too much worried about hacking attemps aimed at my system... so thank you again for sharing your story. It makes me think I have to be more careful.

Best
:P
"A warrior of the light knows that he will hear anorder in the silence of his heart that will guide him."
http://www.warriorofthelight.com
- newsletter! -
Top
simulacrum
Tux's lil' helper
Tux's lil' helper
Posts: 128
Joined: Sat Nov 30, 2002 6:56 am
Location: St Paul, MN
Contact:
Contact simulacrum
Website

I got hacked - awstats vuln

  • Quote

Post by simulacrum » Tue Mar 22, 2005 9:28 pm

You can count me in as a lazy admin with an old version of Awstats (6.2). The cracker was able to load multiple apps, the purpose of which I'm unsure, although one appears to be some kind of IRC bot. The really strange part was my server was fine for the two days since it was compromised. I was SSH'ed in this morning fiddling around as usual for me and I saw the offending process. When I killed it everything went south. Once I booted the LiveCD and looked at the filesystem I found that all the executables in /bin had been overwritten at about the time when I killed that process. It would seem that it was some kind of local root exploit waiting to go off.

I know I'm not the only one who's been rooted because of awstats, but I need to vent. I'm pretty bummed. I'm recompiling now and will soon have a fresh Gentoo install. Ironically, the intrusion happened the day after posting my screenshot in off the wall. I wonder if the script kiddies were looking for vulnerable machines on the Gentoo forums. Beware.
Top
MrUlterior
Guru
Guru
Posts: 511
Joined: Tue Mar 22, 2005 4:25 pm
Location: Switzerland
Contact:
Contact MrUlterior
Website

  • Quote

Post by MrUlterior » Wed Mar 23, 2005 9:25 am

Do you have a .tar of the rootkit or at least the names of the files the intruder uploaded? I'd be very interested having a squiff at that one.

Misanthropy 2.0 - enough hate to go around
Top
Giorgio
Tux's lil' helper
Tux's lil' helper
Posts: 77
Joined: Sat Jan 18, 2003 7:51 pm
Location: Milano, Italy

  • Quote

Post by Giorgio » Wed Mar 23, 2005 12:08 pm

me too...
thanks
app-portage/genlop
A nice emerge.log parser
Top
Maedhros
Bodhisattva
Bodhisattva
User avatar
Posts: 5511
Joined: Wed Apr 14, 2004 8:10 pm
Location: Durham, UK

  • Quote

Post by Maedhros » Wed Mar 23, 2005 1:41 pm

Merged the previous three posts here.
No-one's more important than the earthworm.
Top
djdunn
l33t
l33t
User avatar
Posts: 813
Joined: Sun Dec 26, 2004 2:21 am

  • Quote

Post by djdunn » Wed Mar 23, 2005 3:02 pm

my openbsd gets beat on, on a daily basis for this kind of stuff. for being an old machine. It shrugs the repeated attacks off fine. I don't worry about it. closing my firewall off completly to incomming ports and packets helps. It's part of the times we live in. It's better to adjust and accept that people will try than to make it so that you don't notice they are there. I reinstall every 6 months to keep OpenBSD up to date. So log files arent a big problem. I'd rather them know that im here and they cant mess with me than to be invisible.
“Music is a moral law. It gives a soul to the Universe, wings to the mind, flight to the imagination, a charm to sadness, gaiety and life to everything. It is the essence of order, and leads to all that is good and just and beautiful.”

― Plato
Top
simulacrum
Tux's lil' helper
Tux's lil' helper
Posts: 128
Joined: Sat Nov 30, 2002 6:56 am
Location: St Paul, MN
Contact:
Contact simulacrum
Website

  • Quote

Post by simulacrum » Wed Mar 23, 2005 4:32 pm

The intruder grabbed vulturu.tar.gz and upacked an application called "raven" There were several other applications downloaded but I didn't bother saving them. I guess in retrospect that might have been the way to go. I'd be curious if anyone here was familiar with this vulturu/raven application.
Top
killfire
l33t
l33t
User avatar
Posts: 618
Joined: Sat Oct 04, 2003 11:48 pm
Contact:
Contact killfire
Website

  • Quote

Post by killfire » Thu Mar 24, 2005 3:38 am

ARC2300 wrote:Don't know about anyone else, but I do think that if you get hammered enough on these tries, it can crash your box, or at least drop it offline. I've had my server up for 120 days, no problem. This started, and my box crashes almost every 5 days until I changed ports. And no, there aren't any strange directories or users, and netstat shows only my local IPs causing traffic.

http://home.insightbb.com/~arcruea/attempts.log << Lots of attempts on my IP from 5 log files.

I must say, though, that this is REALLY pissing me off. I've emailed countless abuse@ISP addresses now, and finally gave up. I should write a script, though, that does it for me.

And I looked at one of the address in that attempt log in a web browser. . .it's an HTTP debian server with default install. :?
my suggestion is get another box, as powerful as possible, and install openbsd on it, then set it up as a firewall....


if you can just drop all connections on port 22 except the ones you want (white list it kind of)

or if not, just shut down port 22 for a certain ip after 2 or 3 attempts.... that way, your firewall takes a beating, but who cares, openbsd is like a rock... and your actual computer is free of all but a few connections...

killfire
my website, built in HAppS: http://dbpatterson.com
an art (oil painting) website I built a pure python backend for: http://www.lydiajohnston.com
Top
killfire
l33t
l33t
User avatar
Posts: 618
Joined: Sat Oct 04, 2003 11:48 pm
Contact:
Contact killfire
Website

  • Quote

Post by killfire » Thu Mar 24, 2005 4:08 am

/dev/random wrote:Well I did read all 10 pages before posting so I've seen this mentioned before but this machine is my desktop and an http/ftp server so I don't want to trade off too much usability just for some security. So I was hoping I could figure out a way to sort of halt these hacking attempts without limiting everything else.

if you dont even need ssh, then its simple:

get a dedicated firewall (openbsd is best, but most things will do), a cheap old box will do

and deny everything except port 80 and port 21... (my memories terrible, 21 is ftp right?)

otherwise look into dynamically updating pf's rukes, with something like snortsam...

killfire
my website, built in HAppS: http://dbpatterson.com
an art (oil painting) website I built a pure python backend for: http://www.lydiajohnston.com
Top
rex123
Apprentice
Apprentice
Posts: 272
Joined: Wed Apr 21, 2004 1:08 pm

  • Quote

Post by rex123 » Thu Mar 24, 2005 9:18 am

I've just seen this excellent site: http://www.ranum.com/security/computer_ ... -firewall/
Top
mekong
Tux's lil' helper
Tux's lil' helper
User avatar
Posts: 93
Joined: Fri Apr 23, 2004 1:53 pm
Location: Rdam - NL - EU

  • Quote

Post by mekong » Fri Mar 25, 2005 8:01 pm

One question: Is there a worm active on sshd port? I've got logins attemps a few hunderds time daily from dozen IP's. Are these all hacked linuxboxes?
:cry:
Top
Pacolov
n00b
n00b
User avatar
Posts: 22
Joined: Sat Mar 01, 2003 11:03 am
Contact:
Contact Pacolov
Website

Quite interesting

  • Quote

Post by Pacolov » Fri Mar 25, 2005 9:00 pm

Mar 23 15:11:50 [sshd] Did not receive identification string from 217.74.167.142
Mar 23 15:18:38 [sshd] Illegal user test from 217.74.167.142
Mar 23 15:18:38 [sshd] error: Could not get shadow information for NOUSER
Mar 23 15:18:38 [sshd] Failed password for illegal user test from 217.74.167.142
port 60696 ssh2
Mar 23 15:18:41 [sshd] User guest not allowed because shell /dev/null is not exe
cutable
Mar 23 15:18:41 [sshd] error: Could not get shadow information for NOUSER
Mar 23 15:18:41 [sshd] Failed password for illegal user guest from 217.74.167.14
2 port 60810 ssh2
Mar 23 15:18:45 [sshd] Illegal user admin from 217.74.167.142
Mar 23 15:18:45 [sshd] error: Could not get shadow information for NOUSER
Mar 23 15:18:45 [sshd] Failed password for illegal user admin from 217.74.167.14
2 port 60896 ssh2
Mar 23 15:18:48 [sshd] Illegal user admin from 217.74.167.142
Mar 23 15:18:48 [sshd] error: Could not get shadow information for NOUSER
Mar 23 15:18:48 [sshd] Failed password for illegal user admin from 217.74.167.14
2 port 60989 ssh2
Mar 23 15:18:51 [sshd] Illegal user user from 217.74.167.142
Mar 23 15:18:52 [sshd] error: Could not get shadow information for NOUSER
Mar 23 15:18:52 [sshd] Failed password for illegal user user from 217.74.167.142
port 32852 ssh2
Mar 23 15:18:55 [sshd] Failed password for root from 217.74.167.142 port 32946 s
sh2
Mar 23 15:18:58 [sshd] Failed password for root from 217.74.167.142 port 33031 s
sh2
Mar 23 15:19:02 [sshd] Failed password for root from 217.74.167.142 port 33119 s
sh2
Mar 23 15:19:05 [sshd] Illegal user test from 217.74.167.142
Mar 23 15:19:05 [sshd] error: Could not get shadow information for NOUSER
Mar 23 15:19:05 [sshd] Failed password for illegal user test from 217.74.167.142
port 33213 ssh2
Damn, I didn't even notice that stuff like this is going on at my server. luckily i keep it up to date and have secure logins only and use ssl where i can.

another spot: these fu**** steal bandwidth :o(
e-mail: reactive@gmx.net
HP Compaq NC4200. Centrino Alvisio 1.73GHz, 512MB DDR-II RAM, Intel 915 PCIe Chipset.
Top
sam22
n00b
n00b
Posts: 3
Joined: Sat Apr 26, 2003 3:18 am

I got hacked too

  • Quote

Post by sam22 » Sat Mar 26, 2005 4:28 am

Following is a sample from my log.
This freak is trying with serveral login names. First common male, then female then colors black, red,...
Fortunately none of the times he got access.


Mar 24 22:10:41 vlinsrv sshd[10528]: Illegal user jordan from 82.149.224.51
Mar 24 22:10:41 vlinsrv sshd(pam_unix)[10528]: check pass; user unknown
Mar 24 22:10:41 vlinsrv sshd(pam_unix)[10528]: authentication failure; logname= uid=0 euid=0 tty=NODEVssh ruser= rhost=ftp1.hg-computer.de
Mar 24 22:10:43 vlinsrv sshd[10528]: Failed password for illegal user jordan from 82.149.224.51 port 59084 ssh2
Mar 24 22:10:44 vlinsrv sshd[10530]: Illegal user michael from 82.149.224.51
Mar 24 22:10:45 vlinsrv sshd(pam_unix)[10530]: check pass; user unknown
Mar 24 22:10:45 vlinsrv sshd(pam_unix)[10530]: authentication failure; logname= uid=0 euid=0 tty=NODEVssh ruser= rhost=ftp1.hg-computer.de
Mar 24 22:10:47 vlinsrv sshd[10530]: Failed password for illegal user michael from 82.149.224.51 port 59230 ssh2
Mar 24 22:10:48 vlinsrv sshd[10532]: Illegal user nicole from 82.149.224.51
Mar 24 22:10:49 vlinsrv sshd(pam_unix)[10532]: check pass; user unknown
Mar 24 22:10:49 vlinsrv sshd(pam_unix)[10532]: authentication failure; logname= uid=0 euid=0 tty=NODEVssh ruser= rhost=ftp1.hg-computer.de
Mar 24 22:10:51 vlinsrv sshd[10532]: Failed password for illegal user nicole from 82.149.224.51 port 59371 ssh2
Mar 24 22:10:52 vlinsrv sshd[10534]: Illegal user daniel from 82.149.224.51
Mar 24 22:10:57 vlinsrv sshd(pam_unix)[10534]: check pass; user unknown
Mar 24 22:10:57 vlinsrv sshd(pam_unix)[10534]: authentication failure; logname= uid=0 euid=0 tty=NODEVssh ruser= rhost=ftp1.hg-computer.de
Mar 24 22:11:00 vlinsrv sshd[10534]: Failed password for illegal user daniel from 82.149.224.51 port 59513 ssh2
Top
59729
Apprentice
Apprentice
Posts: 279
Joined: Mon Jun 21, 2004 12:57 am

  • Quote

Post by 59729 » Sun Mar 27, 2005 5:34 pm

ssh displays the ip or the domain from the person trying to login right?

Code: Select all

## drop all from xxx
iptables -A INPUT --source xxx.xxx.xxx.xxx -j DROP
### drop all from xxx on dport 22
#iptables -A INPUT --source xxx.xxx.xxx.xxx --dport 22 -j DROP
Top
moocha
Watchman
Watchman
Posts: 5722
Joined: Tue Oct 21, 2003 6:45 pm

  • Quote

Post by moocha » Mon Mar 28, 2005 9:59 am

simulacrum wrote:The intruder grabbed vulturu.tar.gz and upacked an application called "raven" There were several other applications downloaded but I didn't bother saving them. I guess in retrospect that might have been the way to go. I'd be curious if anyone here was familiar with this vulturu/raven application.
Bit of trivia: In Romanian, "vultur" means "eagle". Sounds like a nickname / handle for the creator of the corresponding rootkit. Not surprising, too - Romania does seem to exhibit an unusually high density of script kiddies per square kilometer.
Military Commissions Act of 2006: http://tinyurl.com/jrcto

"Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety."
-- attributed to Benjamin Franklin
Top
Mythos
l33t
l33t
User avatar
Posts: 953
Joined: Sun May 02, 2004 11:54 pm
Location: Portugal
Contact:
Contact Mythos
Website

  • Quote

Post by Mythos » Tue Mar 29, 2005 12:20 am

sorry but ... why use 22 port ? change port ...

Block as default your iptables and only allow what you want ...

install hardened-dev-sources with gprsec and pAX plus selinux, then your system is close to openbsd and heaven secure i guess.


something like this ...

Code: Select all

#Accept NEW,ESTABLISHED,RELATED
ACCEPTNER='-m state --state NEW,ESTABLISHED,RELATED -j ACCEPT'
ACCEPTER='-m state --state ESTABLISHED,RELATED -j ACCEPT'
ACCEPTN='-m state --state NEW -j ACCEPT'
AC='-m state --state NEW,ESTABLISHED,RELATED' 

# Only chosen port's will be accept.
$IPTABLES -P INPUT DROP
$IPTABLES -P OUTPUT DROP
$IPTABLES -P FORWARD DROP 

$IPTABLES -A INPUT -p tcp $ACCEPTER
$IPTABLES -A INPUT -p tcp -s $EXTIP -d $locaIP --dport 1022 $ACCEPTN #SSHD 

#Block all
$IPTABLES -A INPUT -p tcp -j DROP 
i have this in my sshd_config

Code: Select all

#/etc/ssh/sshd_config
Port 1022
Protocol 2
AllowUsers dune
LoginGraceTime 1m
PermitRootLogin no
StrictModes yes
MaxAuthTries 2
PasswordAuthentication no
PermitEmptyPasswords no
UsePAM yes
Subsystem       sftp    /usr/lib/misc/sftp-server
Best Regards,
Sérgio Henrique
Linux dune 3.0.6-gentoo #1 SMP Thu Oct 27 16:47:29 WEST 2011 x86_64 Intel(R) Core(TM)2 Duo CPU T7500 @ 2.20GHz GenuineIntel GNU/Linux
Top
alxcm
n00b
n00b
Posts: 5
Joined: Wed Mar 09, 2005 8:12 pm

  • Quote

Post by alxcm » Tue Mar 29, 2005 3:30 am

Hey all...

Do you think a firewall is really necessary? I run a DMZ'd server with the following nmap -sS reply:

Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2005-03-28 12:22 EST
Interesting ports on xxx (x.x.x.x):
(The 1655 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
80/tcp open http
111/tcp open rpcbind
631/tcp open ipp
1024/tcp open kdm
1025/tcp open NFS-or-IIS
2049/tcp open nfs
3632/tcp open distccd
8080/tcp open http-proxy

Nmap run completed -- 1 IP address (1 host up) scanned in 188.675 seconds

I get people bouncing off of ssh all the time but my passwords are very secure...nobody has yet logged in, as far as I can tell from the logs. I know distcc might not be the best idea, but I'll probably set up iptables for that. Anyway, any insecurities you can see right off the bat?
Top
moocha
Watchman
Watchman
Posts: 5722
Joined: Tue Oct 21, 2003 6:45 pm

  • Quote

Post by moocha » Tue Mar 29, 2005 5:37 am

alxcm wrote:Anyway, any insecurities you can see right off the bat?
There's a difference between "insecure" and "exploitable". Assuming you're running the latest packages, there are no known exploitable vulnerabilities there. But there are two basic vulnerabilities:
  • It's possible to launch denial of service attacks against the services running on open ports, even if access control prevents unauthorized users using your services (for example, flooding the HTTP proxy with requests)
  • Nobody can guarantee the non-existence of any exploitable vulnerabilities on those services. Historically, for example, the portmapper (port 111) has been an entry portal for a lot of nasty things (anyone remember rpcstatd? :D).
Military Commissions Act of 2006: http://tinyurl.com/jrcto

"Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety."
-- attributed to Benjamin Franklin
Top
Mythos
l33t
l33t
User avatar
Posts: 953
Joined: Sun May 02, 2004 11:54 pm
Location: Portugal
Contact:
Contact Mythos
Website

  • Quote

Post by Mythos » Tue Mar 29, 2005 11:35 am

moocha wrote:
alxcm wrote:Anyway, any insecurities you can see right off the bat?
There's a difference between "insecure" and "exploitable". Assuming you're running the latest packages, there are no known exploitable vulnerabilities there. But there are two basic vulnerabilities:
  • It's possible to launch denial of service attacks against the services running on open ports, even if access control prevents unauthorized users using your services (for example, flooding the HTTP proxy with requests)
  • Nobody can guarantee the non-existence of any exploitable vulnerabilities on those services. Historically, for example, the portmapper (port 111) has been an entry portal for a lot of nasty things (anyone remember rpcstatd? :D).
I think that hardened-dev-sources, have an option that prevent's that http request attack ...

Code: Select all

[*] Deter exploit bruteforcing 

 CONFIG_GRKERNSEC_BRUTE:                                                 │
  │                                                                         │
  │ If you say Y here, attempts to bruteforce exploits against forking      │
  │ daemons such as apache or sshd will be deterred.  When a child of a     │
  │ forking daemon is killed by PaX or crashes due to an illegal            │
  │ instruction, the parent process will be delayed 30 seconds upon every   │
  │ subsequent fork until the administrator is able to assess the           │
  │ situation and restart the daemon.  It is recommended that you also      │
  │ enable signal logging in the auditing section so that logs are          │
  │ generated when a process performs an illegal instruction.               │
  │                                                                         │
  │ Symbol: GRKERNSEC_BRUTE [=y]                                            │
  │ Prompt: Deter exploit bruteforcing                                      │
  │   Defined at grsecurity/Kconfig:248                                     │
  │   Depends on: GRKERNSEC                                                 │
  │   Location:     
Best Regards,
Sérgio Henrique
Linux dune 3.0.6-gentoo #1 SMP Thu Oct 27 16:47:29 WEST 2011 x86_64 Intel(R) Core(TM)2 Duo CPU T7500 @ 2.20GHz GenuineIntel GNU/Linux
Top
moocha
Watchman
Watchman
Posts: 5722
Joined: Tue Oct 21, 2003 6:45 pm

  • Quote

Post by moocha » Tue Mar 29, 2005 12:52 pm

No, Mythos, that's a completely different thing. CONFIG_GRKERNSEC_BRUTE does not protect you against a large number of requests, it just prevents forkbombing as a side effect of a large number of request, should those requests cause the daemon to die. Even then you're still potentially vulnerable to resource starvation attacks.
Military Commissions Act of 2006: http://tinyurl.com/jrcto

"Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety."
-- attributed to Benjamin Franklin
Top
Mythos
l33t
l33t
User avatar
Posts: 953
Joined: Sun May 02, 2004 11:54 pm
Location: Portugal
Contact:
Contact Mythos
Website

  • Quote

Post by Mythos » Tue Mar 29, 2005 8:38 pm

well there are no perfect system ... the best solution is patching, updating and choose carefully what services users and port's are needed...
Best Regards,
Sérgio Henrique
Linux dune 3.0.6-gentoo #1 SMP Thu Oct 27 16:47:29 WEST 2011 x86_64 Intel(R) Core(TM)2 Duo CPU T7500 @ 2.20GHz GenuineIntel GNU/Linux
Top
moocha
Watchman
Watchman
Posts: 5722
Joined: Tue Oct 21, 2003 6:45 pm

  • Quote

Post by moocha » Wed Mar 30, 2005 6:50 am

Mythos wrote:well there are no perfect system ... the best solution is patching, updating and choose carefully what services users and port's are needed...
That's very good advice. In order to have a stable and secure system, less is always more :).
Military Commissions Act of 2006: http://tinyurl.com/jrcto

"Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety."
-- attributed to Benjamin Franklin
Top
someguy
Guru
Guru
Posts: 433
Joined: Thu Jul 10, 2003 2:13 am
Location: (-_-) .::OH_WELL::. (-_-)

  • Quote

Post by someguy » Wed Mar 30, 2005 4:36 pm

indeed
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`
while [ 1 ] ; do echo "*" | telnet ip.of.print.er 9100 ; done
Top
Legoguy
Apprentice
Apprentice
User avatar
Posts: 166
Joined: Mon Dec 22, 2003 3:35 am
Location: Edmonton, Alberta, Canada
Contact:
Contact Legoguy
Website

  • Quote

Post by Legoguy » Fri Apr 01, 2005 3:10 am

Beware. The list of names they try is getting longer:

http://turbogfx.homelinux.org/sshattempts.txt

That was logged on the 25th, 6 days ago. 587 attempts within 10 minutes. Of course none of them were harmful (none of them existed) but I'd imagine the list is getting longer as the thing breaks into more boxes.

Starting from October 29th 2004, there have been 4166 attempts on my machine... none of them doing anything. You only really need to worry if you have a user/pass the same, although I can't confirm that, but it seems to be the case.

To find all of the relevant items in your log:

Code: Select all

grep "sshd\[[0-9]\+\]: \(Invalid\|User\|reverse\)" /var/log/messages
Add a " | wc -l " on it to see the number of attempts.
Top
Post Reply

443 posts
  • Page 11 of 18
    • Jump to page:
  • Previous
  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • 18
  • Next

Return to “Networking & Security”

Jump to
  • Assistance
  • ↳   News & Announcements
  • ↳   Frequently Asked Questions
  • ↳   Installing Gentoo
  • ↳   Multimedia
  • ↳   Desktop Environments
  • ↳   Networking & Security
  • ↳   Kernel & Hardware
  • ↳   Portage & Programming
  • ↳   Gamers & Players
  • ↳   Other Things Gentoo
  • ↳   Unsupported Software
  • Discussion & Documentation
  • ↳   Documentation, Tips & Tricks
  • ↳   Gentoo Chat
  • ↳   Gentoo Forums Feedback
  • ↳   Duplicate Threads
  • International Gentoo Users
  • ↳   中文 (Chinese)
  • ↳   Dutch
  • ↳   Finnish
  • ↳   French
  • ↳   Deutsches Forum (German)
  • ↳   Diskussionsforum
  • ↳   Deutsche Dokumentation
  • ↳   Greek
  • ↳   Forum italiano (Italian)
  • ↳   Forum di discussione italiano
  • ↳   Risorse italiane (documentazione e tools)
  • ↳   Polskie forum (Polish)
  • ↳   Instalacja i sprzęt
  • ↳   Polish OTW
  • ↳   Portuguese
  • ↳   Documentação, Ferramentas e Dicas
  • ↳   Russian
  • ↳   Scandinavian
  • ↳   Spanish
  • ↳   Other Languages
  • Architectures & Platforms
  • ↳   Gentoo on ARM
  • ↳   Gentoo on PPC
  • ↳   Gentoo on Sparc
  • ↳   Gentoo on Alternative Architectures
  • ↳   Gentoo on AMD64
  • ↳   Gentoo for Mac OS X (Portage for Mac OS X)
  • Board index
  • All times are UTC
  • Delete cookies

© 2001–2026 Gentoo Foundation, Inc.

Powered by phpBB® Forum Software © phpBB Limited

Privacy Policy

 

 

magic