Forums

Skip to content

Advanced search
  • Quick links
    • Unanswered topics
    • Active topics
    • Search
  • FAQ
  • Login
  • Register
  • Board index Assistance Networking & Security
  • Search

i got hacked. what were they up to?

Having problems getting connected to the internet or running a server? Wondering about securing your box? Ask here.
Post Reply
Advanced search
443 posts
  • Page 15 of 18
    • Jump to page:
  • Previous
  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • Next
Author
Message
LostControl
l33t
l33t
User avatar
Posts: 885
Joined: Tue Mar 02, 2004 5:10 pm
Location: La Glane, Suisse
Contact:
Contact LostControl
Website

  • Quote

Post by LostControl » Tue Jul 12, 2005 10:01 am

Maybe you could try Fail2Ban. It will allow you to have an external access to your SSH server and will block script kiddies trying to break in :wink: It runs on my home server and blocks 3-4 attempts a day.

Ebuilds are available on the website or in bugzilla.
http://www.jaqpot.net
http://www.fail2ban.org
Top
christsong84
Veteran
Veteran
User avatar
Posts: 1003
Joined: Sun Apr 06, 2003 10:04 pm
Location: GMT-8 (Spokane)

Re: Why?

  • Quote

Post by christsong84 » Fri Jul 15, 2005 8:54 pm

segedunum wrote:Can anyone tell me why on Earth anyone is running a damn SSH server publicly?! For goodness sake, if you need admin access to your server outside then install yourself a damn VPN to do it such as OpenVPN or an IPSec one.

If you're behind a firewall that restricts outgoings that blocks VPN connections then I could understand but that's not very likely, and even then, it would have to allow SSH to get remote access. If you're in that position then have to make a serious considered decision about whether it's worth the risk to remote admin your server through a publicly available SSH service running on it. If you're having to consider configuring your firewall to disallow bots coming from Pakistan or somewhere else, talking about portknocking, worrying about totally securing your passwords or you're having to parse your logs like crazy as a knee-jerk reaction then you're simply never going to get ahead. I can get full remote access to my server but there are no dodgy unsuccessful SSH logins in my logs :wink:.

Sorry, but I think anyone who runs anything publicly like this is just plain silly - and I'm being polite there.
My servers are co-located 3 stories below ground on the other side of town. I sign in from the office for daily maintenance and checks. It's not on it's own network so I don't set up a VPN connection...SSH does the job just fine for me. Like I've said before, only bots have hit my servers so changing the port seemed to do the trick. :) (and the whole key based logins and such other obvious procedures :) )
while(true) {self.input(sugar);} :twisted:
Top
alex6z
Tux's lil' helper
Tux's lil' helper
Posts: 119
Joined: Wed Jul 20, 2005 3:13 pm

  • Quote

Post by alex6z » Wed Jul 20, 2005 5:16 pm

I have (an) open account(s) on my system. I put them there to see who would login and wait and see what they try to do. I just don't get why people are so scared. They shouldn't be able to get root access from the account. I have it set up with limits and outgoing firewall so they can't use an IRC bot. So far nothing too interesting has happened .
2005-07-19 my dynamic IP is ssh://admin@12.223.170.28/ try it out. I know it's risky allowing anonymous shell access, but it's still safer than windows and I really don't care anyway, computer are just toys for me :)
Top
nhaggin
n00b
n00b
User avatar
Posts: 74
Joined: Sat Jun 15, 2002 6:44 pm
Location: Illinois, USA

  • Quote

Post by nhaggin » Thu Jul 21, 2005 4:51 pm

Can anyone tell me why on Earth anyone is running a damn SSH server publicly?! For goodness sake, if you need admin access to your server outside then install yourself a damn VPN to do it such as OpenVPN or an IPSec one.
The simple fact is that running any service whatsoever, on any port, is a security hazard. The only truly secure network is the one you don't build, and the only truly secure computer is in a concrete bunker, under armed guard, with console access only, etc. Even then, there are various points of attack one could use to gain access, if one really wanted to.

It is currently fashionable for 1337 $cr!p+ k!ddi3z to hit systems running SSH. Security-compromising errors have been found before in ipsec-tools, and if one wanted one could probably attempt to mount an attack against IPSec. OpenVPN is a great piece of software (I use it extensively), but I'm sure that a programming error will slip in at some point and that an attack could be devised against it. But for right now, SSH is a far more inviting target: so many more people use it, and there is a much simpler method of attack if the admin has open accounts on his box.
Nick

A.M.D.G.
Top
red-wolf76
l33t
l33t
User avatar
Posts: 714
Joined: Wed Apr 13, 2005 6:20 pm
Location: Rhein-Main Area

Ok, so I think I got haX0r3D as well...

  • Quote

Post by red-wolf76 » Sat Jul 23, 2005 11:58 pm

Strange behaviours on my home network tonight, dudes...

Ok, so I got a nice little home network going at my place which my girl-friend, her parents and I use (yeah, I know it's corny to live in with the Ps but hey, it saves rent!). Topology is as follows:

Router ------------ Parents PC (WinXP)
|
Switch ------------ Girl-friend's PC (Gentoo 2.6.12-r6)
|------------------- My PC (Win2000)
|------------------- Bragi (D-Link Printer Server)
\--- Balder (Wireless Bridging Access Point) ---)) ((--- Asgard (WBAP)

Asgard is connected to another switch and two more boxen are hooked onto there, "dagon" and "nyarlathotep" which are also running Gentoo. The router does have an inbuilt "firewall", but some ports are mapped to the different boxen for direct Messaging connections. And some online gaming stuff (AAO, mostly but only to the Win2000 box). The router (and modem) is a German Zyxel Prestige 660HW with the "Arcorized" firmware, since we got it from Arcor, our DSL-Provider.

Now tonight (I'm not at home, mind you) I get a call from my gf that computers are behaving strangely. First of all, she got a window telling her "Just looking in. The boring guy!" (written in German, though!) which according to her description looks much like a simple X-Window. Then she panics and shuts down her Linux box but it starts up again, as does my Win2000 box (which was off in the first place!). However - she claims - my box kept shutting down again and trying to rise a couple of times. So I tell her to take the router off-line by turning off the power for it and the magic stops.

Now, I'm not in a position to verify all this, but I've no reason to believe she's lying. What has happed? Possible suspect for this is a guy who turned annoying on ICQ (she uses GAIM for that and YAHOO! on her box) and got told off by her.

Conclusions according to current knowledge:
1.) The guy came in over the router. Weird stuff stopped when it got downed, so I guess my wireless bridge is more or less secure still... :?
2.) Possibly he gained access to my gf's box, which runs the latest "x86" GAIM on top of Gentoo (2.6.2-gentoo-r6 kernel) 8O
3.) He probably was able to send wake-on-lan packets to muck with the other boxen on the network :oops:
4.) I need to secure my network better. ASAP! :evil:

What was going on? Since I wasn't there to witness the whole event, I'm a bit skeptical about it all, but concerned nonetheless. I do fear that whoever was sending on-screen messages got root access though (which my gf doesn't have, even though the account can do "su".) so I'll be reading up on security a bit more than I was.

Are there any known vulnerabilities in GAIM that attackers can use to hijack a box in this manner?

It makes for a funny story, actually, but does anyone have a suggestion? Thanks for the time and don't bother trying not to laugh. Hell, even I had to chuckle about it... :lol:
0mFg, G3nt00 r0X0r$ T3h B1g!1111 ;)

Use sane CFLAGS! If for no other reason, do it for the lulz!
Top
alex6z
Tux's lil' helper
Tux's lil' helper
Posts: 119
Joined: Wed Jul 20, 2005 3:13 pm

  • Quote

Post by alex6z » Sun Jul 24, 2005 12:49 pm

The thing it, when you make your box public, it defeats the point of hacking it. What's the point if the person your hacking doesn't care? Go hack your own box!
Top
lbrtuk
l33t
l33t
User avatar
Posts: 910
Joined: Thu May 08, 2003 3:02 pm

  • Quote

Post by lbrtuk » Sun Jul 24, 2005 3:34 pm

alex6z wrote:The thing it, when you make your box public, it defeats the point of hacking it. What's the point if the person your hacking doesn't care? Go hack your own box!
That's all well and fine until your machine is being used as a spam relay, being used as a ddos drone, or is set up to relay child porn / stolen credit card numbers etc.
Top
jamapii
l33t
l33t
User avatar
Posts: 637
Joined: Thu Sep 16, 2004 6:22 pm

Re: Ok, so I think I got haX0r3D as well...

  • Quote

Post by jamapii » Sun Jul 24, 2005 9:35 pm

red-wolf76 wrote:Then she panics and shuts down her Linux box but it starts up again, as does my Win2000 box (which was off in the first place!). However - she claims - my box kept shutting down again and trying to rise a couple of times.
Some other box besides hers might be infested. Something must have sent those wake-on-lan packages.
(she uses GAIM for that and YAHOO! on her box)
gaim had some security issues recently, possibly it's not over yet
1.) The guy came in over the router. Weird stuff stopped when it got downed, so I guess my wireless bridge is more or less secure still... :?
WPA is generally considered OK, but I prefer openvpn.

The simple X window could be the Windows Message Service (if enabled in /etc/samba/smb.conf - it's "message command") (it is used in Windows to pop up windows with spam).
Top
red-wolf76
l33t
l33t
User avatar
Posts: 714
Joined: Wed Apr 13, 2005 6:20 pm
Location: Rhein-Main Area

Re: Ok, so I think I got haX0r3D as well...

  • Quote

Post by red-wolf76 » Mon Jul 25, 2005 8:47 am

jamapii wrote:
red-wolf76 wrote:Then she panics and shuts down her Linux box but it starts up again, as does my Win2000 box (which was off in the first place!). However - she claims - my box kept shutting down again and trying to rise a couple of times.
Some other box besides hers might be infested. Something must have sent those wake-on-lan packages.
I'll check for that. Are there any good tools for finding out if your box has been rooted or otherwise infected?
(she uses GAIM for that and YAHOO! on her box)
gaim had some security issues recently, possibly it's not over yet
I'll turn off the direct connections for now. That ought to stop the most obvious POE.
1.) The guy came in over the router. Weird stuff stopped when it got downed, so I guess my wireless bridge is more or less secure still... :?
WPA is generally considered OK, but I prefer openvpn.
I'm not sure the APs are capable of that, but I'll have a look.
The simple X window could be the Windows Message Service (if enabled in /etc/samba/smb.conf - it's "message command") (it is used in Windows to pop up windows with spam).
Ah, that'll go too then, if it is installed. I do use a SMB-utility to access the Win2K file shares when necessary.

Thanks for the pointers. I'm itching to get home and have a look.
0mFg, G3nt00 r0X0r$ T3h B1g!1111 ;)

Use sane CFLAGS! If for no other reason, do it for the lulz!
Top
Zepp
Veteran
Veteran
User avatar
Posts: 1246
Joined: Mon Mar 15, 2004 9:43 pm
Location: Ontario, Canada

  • Quote

Post by Zepp » Mon Jul 25, 2005 9:03 am

The package chkrootkit will try and look for installed rootkits, if they did that. Not sure otherwise how you can tell other then to watch it carefully, or unless they didn't erase some logs :/
Top
jamapii
l33t
l33t
User avatar
Posts: 637
Joined: Thu Sep 16, 2004 6:22 pm

Re: Ok, so I think I got haX0r3D as well...

  • Quote

Post by jamapii » Mon Jul 25, 2005 9:11 pm

red-wolf76 wrote:I'll check for that. Are there any good tools for finding out if your box has been rooted or otherwise infected?
... and rkhunter.
WPA is generally considered OK, but I prefer openvpn.
I'm not sure the APs are capable of that, but I'll have a look.
Recent APs should be capable of WPA, but openvpn is usually only done by computers. (client(s) <-> server)
Top
red-wolf76
l33t
l33t
User avatar
Posts: 714
Joined: Wed Apr 13, 2005 6:20 pm
Location: Rhein-Main Area

Re: Ok, so I think I got haX0r3D as well...

  • Quote

Post by red-wolf76 » Thu Jul 28, 2005 1:33 pm

jamapii wrote:
red-wolf76 wrote:I'll check for that. Are there any good tools for finding out if your box has been rooted or otherwise infected?
... and rkhunter.
WPA is generally considered OK, but I prefer openvpn.
I'm not sure the APs are capable of that, but I'll have a look.
Recent APs should be capable of WPA, but openvpn is usually only done by computers. (client(s) <-> server)
Thanks for the pointers. Neither rkhunter nor chkrootkit found any abnormalities on the supposedly affected system. I do have root login over ssh enabled, but only from LAN IPs (if God is indeed merciful and my config correct) however so I can muck about on the box from my PC when my gf uses it. :oops:

So far the guy hasn't turned up again, so if I don't find anything on the other boxen, I'll check it off as a (probably relatively harmless) "sK1Rp7-K1Dd3e"-Intrusion along the lines of "Behold my mighty sexual prowess as I make your computer start up using a packet!" :?

Or it's all urban legend, I didn't witness the incident after all... :roll:

P.S.: The APs are WEP-enabled. D-Link has issues using WPA in Bridge Mode - God knows why! :cry:
0mFg, G3nt00 r0X0r$ T3h B1g!1111 ;)

Use sane CFLAGS! If for no other reason, do it for the lulz!
Top
Zepp
Veteran
Veteran
User avatar
Posts: 1246
Joined: Mon Mar 15, 2004 9:43 pm
Location: Ontario, Canada

  • Quote

Post by Zepp » Thu Jul 28, 2005 7:17 pm

Don't enable direct root login for ssh, just add whatever use you want, like yours, to the wheel group and then login to that user via ssh and su to root.
Top
red-wolf76
l33t
l33t
User avatar
Posts: 714
Joined: Wed Apr 13, 2005 6:20 pm
Location: Rhein-Main Area

  • Quote

Post by red-wolf76 » Thu Jul 28, 2005 8:46 pm

Zepp wrote:Don't enable direct root login for ssh, just add whatever use you want, like yours, to the wheel group and then login to that user via ssh and su to root.
Actually, this seriously sounds like a Good Thing™. It's what I do when I access the machines directly to avoid running KDE (or Gnome on another box) as root.

Just for an annoyingly dumb question (:oops:), though: Why exactly is allowing root SSH logins while restricting it to a trusted list of IPs a Bad Thing™? Is it because of spoofing IPs?
0mFg, G3nt00 r0X0r$ T3h B1g!1111 ;)

Use sane CFLAGS! If for no other reason, do it for the lulz!
Top
Zepp
Veteran
Veteran
User avatar
Posts: 1246
Joined: Mon Mar 15, 2004 9:43 pm
Location: Ontario, Canada

  • Quote

Post by Zepp » Sat Jul 30, 2005 1:04 am

Ya IPs and MAC adresses can be spoofed so it isn't really a great idea to depend on them for security that much :/
Top
agrippa_cash
Tux's lil' helper
Tux's lil' helper
User avatar
Posts: 143
Joined: Thu May 08, 2003 6:42 pm
Location: Los Angeles

Probibally not hacked

  • Quote

Post by agrippa_cash » Sat Jul 30, 2005 2:34 am

My XFS (and therefore X) didn't start a couple days ago, so I went through the logs and saw that someone did a ssh portscan of my computer. I thought that maybe I was hacked so I booted with an Insert knoppix disk and ran chkrootkit and rkhunter and the second alerted me that signs of GasKit were found on my system. The positive sign of GasKit was a /dev/dev. As the second dev had an entire system's worth of devs, I'm inclined to believe that this is an artifact from when I first began messing around with udev. No rootkit binaries or scripts were found and once I rm -Rf'ed /dev/* the warning disappeared.

X started fine once I rm'ed /tmp, so I think I may have cut the power on my surge protector too early and maybe some lock file was still in place causing xfs to fail. At least I hope this is the case. You confirmation would be appreciated.

PS: I have ssh root disabled, and almost no network services running.
Athlon xp 1700+;VIA-KT266;512mb RAM;Radeon 9600
-running with udev, hal, dbus, pmount & modular-xorg
Top
SwiftWind
n00b
n00b
Posts: 6
Joined: Fri Feb 27, 2004 11:11 pm

  • Quote

Post by SwiftWind » Tue Aug 02, 2005 11:33 pm

Holy cow...I checked my logs, there have been so many attempts. I have no idea how to check if there were any successful ones. For some reason in the SSHD folder its only keeping logs for the last 2 days. Can someone recommend what logs I should look for any successful logins? and in what directory?

I want to make sure no one got anything.

Thank you for your time.
Computers are like Air-Conditioners. Once you open windows they stop working.
Top
whiskers
n00b
n00b
Posts: 45
Joined: Sun Jul 17, 2005 12:07 am

  • Quote

Post by whiskers » Mon Aug 08, 2005 12:58 am

Captain_Loser wrote:Wow, I just looked through my logs and found a whole lot of failed ssh logins, and what I guess are rootkit attempts.. I am very surprised to see this many cracking attempts aimed at me. I am running a very safe system, but it makes you think.. I am sure glad gentoo has things like emerge -u.

what is a "very safe system" and how can you get it there?
Top
meu
n00b
n00b
Posts: 21
Joined: Fri Aug 05, 2005 7:51 pm
Location: Russia, Saint-Petersburg

  • Quote

Post by meu » Tue Aug 09, 2005 6:05 pm

SwiftWind wrote:Holy cow...I checked my logs, there have been so many attempts. I have no idea how to check if there were any successful ones. For some reason in the SSHD folder its only keeping logs for the last 2 days. Can someone recommend what logs I should look for any successful logins? and in what directory?
You can use the `last` command to see users who logged into the system. Although, this can only help if attacker haven't got root access, in which case he could just change the logs.
Top
hollywoodcole
n00b
n00b
User avatar
Posts: 68
Joined: Tue Oct 26, 2004 5:36 am
Location: Oxford, Mississippi
Contact:
Contact hollywoodcole
Website

  • Quote

Post by hollywoodcole » Thu Aug 11, 2005 6:35 pm

alex6z wrote:I have (an) open account(s) on my system. I put them there to see who would login and wait and see what they try to do. I just don't get why people are so scared. They shouldn't be able to get root access from the account. I have it set up with limits and outgoing firewall so they can't use an IRC bot. So far nothing too interesting has happened .
2005-07-19 my dynamic IP is ssh://admin@12.223.170.28/ try it out. I know it's risky allowing anonymous shell access, but it's still safer than windows and I really don't care anyway, computer are just toys for me :)
Nice work alex, I have been checking the bash_history for a while now and am finding some funny things!
i.e.
/sbin/shutdown -r 1
If the code and the comments disagree, then both are probably wrong.
---/usr/games/fortune

Hollywoodcole.com
Top
segedunum
n00b
n00b
Posts: 29
Joined: Sat Jul 03, 2004 9:51 pm

  • Quote

Post by segedunum » Thu Aug 18, 2005 9:44 pm

The simple fact is that running any service whatsoever, on any port, is a security hazard. The only truly secure network is the one you don't build, and the only truly secure computer is in a concrete bunker, under armed guard, with console access only, etc. Even then, there are various points of attack one could use to gain access, if one really wanted to.
That's the usual cop-out rubbish I'm afraid. There are certain things you can do to make your system more secure, and piping SSH and other admin tools through a VPN is definitely one of them.
It is currently fashionable for 1337 $cr!p+ k!ddi3z to hit systems running SSH.
Which is why I recommend, not unreasonably, not running SSH and piping it through something else.
Security-compromising errors have been found before in ipsec-tools, and if one wanted one could probably attempt to mount an attack against IPSec.
Is that more or less likely than an attack on a public SSH server resulting in a compromise?
OpenVPN is a great piece of software (I use it extensively), but I'm sure that a programming error will slip in at some point and that an attack could be devised against it.
Yes, and it's far more difficult to mount an attack on this than on a running, publicly available SSH server. It's going to be that much more difficult to find a compromise. It's a question of who's your worst enemy.
But for right now, SSH is a far more inviting target: so many more people use it
Errr, yes - which is why I recommend piping your SSH and other admin tools through a VPN. It's the best, and most secure option. I also think you're misunderstanding things in that you're assuming that if VPN usage gets more popular than SSH then VPNs will be hacked, including Microsoft. That's normal tosh a a lot of people tend to assume. No one claims a VPN is uncompromisable, but having a VPN using a set of secured, signed and trusted certificates is going to be a heck of a lot tougher to have a script-kiddy go at than a public SSH server.

Think about it.
Top
labrador
Guru
Guru
User avatar
Posts: 316
Joined: Sat Oct 04, 2003 1:10 am

nmap says: Host seems down

  • Quote

Post by labrador » Thu Aug 25, 2005 6:09 pm

alex6z wrote:I have (an) open account(s) on my system. I put them there to see who would login and wait and see what they try to do. I just don't get why people are so scared. They shouldn't be able to get root access from the account. I have it set up with limits and outgoing firewall so they can't use an IRC bot. So far nothing too interesting has happened .
2005-07-19 my dynamic IP is ssh://admin@12.223.170.28/ try it out. I know it's risky allowing anonymous shell access, but it's still safer than windows and I really don't care anyway, computer are just toys for me :)
I was going to take a look but ssh to thath box timed out, and nmap says it
can't be found with a standard probe.

Have you heard of shell fork bomb attacks? Did you set up limits
to prevent that sort of abuse? Perhaps that's why I can't get on it?

There is no such thing as "safe" with a system you've set up with no
password and advertised to the whole world is wide open. Would you
leave your house unlocked, then publish an ad in the newspaper
that such and such an address is not locked?
Top
christsong84
Veteran
Veteran
User avatar
Posts: 1003
Joined: Sun Apr 06, 2003 10:04 pm
Location: GMT-8 (Spokane)

Re: nmap says: Host seems down

  • Quote

Post by christsong84 » Thu Aug 25, 2005 6:32 pm

labrador wrote:
alex6z wrote:I have (an) open account(s) on my system. I put them there to see who would login and wait and see what they try to do. I just don't get why people are so scared. They shouldn't be able to get root access from the account. I have it set up with limits and outgoing firewall so they can't use an IRC bot. So far nothing too interesting has happened .
2005-07-19 my dynamic IP is ssh://admin@12.223.170.28/ try it out. I know it's risky allowing anonymous shell access, but it's still safer than windows and I really don't care anyway, computer are just toys for me :)
I was going to take a look but ssh to thath box timed out, and nmap says it
can't be found with a standard probe.

Have you heard of shell fork bomb attacks? Did you set up limits
to prevent that sort of abuse? Perhaps that's why I can't get on it?

There is no such thing as "safe" with a system you've set up with no
password and advertised to the whole world is wide open. Would you
leave your house unlocked, then publish an ad in the newspaper
that such and such an address is not locked?
note the date of that post and the fact that it's a dynamic IP (which was stated). THat's probably more the reason you can't get into it...it's somewhere else by now.
while(true) {self.input(sugar);} :twisted:
Top
philidias
n00b
n00b
Posts: 6
Joined: Fri Sep 02, 2005 11:10 pm

software

  • Quote

Post by philidias » Fri Sep 02, 2005 11:15 pm

you need to get hacking preventing software such as zone alarms. Turn off your internet connection. Scan you computer.
Top
krazykit
Tux's lil' helper
Tux's lil' helper
User avatar
Posts: 91
Joined: Sat Aug 28, 2004 5:12 pm

Re: software

  • Quote

Post by krazykit » Sun Sep 04, 2005 5:54 pm

philidias wrote:you need to get hacking preventing software such as zone alarms. Turn off your internet connection. Scan you computer.
Do you have any idea what you said? "zone alarms" possibly means a Windows software firewall known as ZoneAlarm. If you're asking to scan our computers with ZoneAlarm (again, Windows software, and it doesn't do this anyway)... Why are you posting advice when you can't even get the OS right?
Top
Post Reply

443 posts
  • Page 15 of 18
    • Jump to page:
  • Previous
  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • Next

Return to “Networking & Security”

Jump to
  • Assistance
  • ↳   News & Announcements
  • ↳   Frequently Asked Questions
  • ↳   Installing Gentoo
  • ↳   Multimedia
  • ↳   Desktop Environments
  • ↳   Networking & Security
  • ↳   Kernel & Hardware
  • ↳   Portage & Programming
  • ↳   Gamers & Players
  • ↳   Other Things Gentoo
  • ↳   Unsupported Software
  • Discussion & Documentation
  • ↳   Documentation, Tips & Tricks
  • ↳   Gentoo Chat
  • ↳   Gentoo Forums Feedback
  • ↳   Duplicate Threads
  • International Gentoo Users
  • ↳   中文 (Chinese)
  • ↳   Dutch
  • ↳   Finnish
  • ↳   French
  • ↳   Deutsches Forum (German)
  • ↳   Diskussionsforum
  • ↳   Deutsche Dokumentation
  • ↳   Greek
  • ↳   Forum italiano (Italian)
  • ↳   Forum di discussione italiano
  • ↳   Risorse italiane (documentazione e tools)
  • ↳   Polskie forum (Polish)
  • ↳   Instalacja i sprzęt
  • ↳   Polish OTW
  • ↳   Portuguese
  • ↳   Documentação, Ferramentas e Dicas
  • ↳   Russian
  • ↳   Scandinavian
  • ↳   Spanish
  • ↳   Other Languages
  • Architectures & Platforms
  • ↳   Gentoo on ARM
  • ↳   Gentoo on PPC
  • ↳   Gentoo on Sparc
  • ↳   Gentoo on Alternative Architectures
  • ↳   Gentoo on AMD64
  • ↳   Gentoo for Mac OS X (Portage for Mac OS X)
  • Board index
  • All times are UTC
  • Delete cookies

© 2001–2026 Gentoo Foundation, Inc.

Powered by phpBB® Forum Software © phpBB Limited

Privacy Policy

 

 

magic