Groups | Search | Server Info | Login | Register
Groups > comp.os.linux.security > #710
| From | Moe Trin <ibuprofin@painkiller.example.tld.invalid> |
|---|---|
| Newsgroups | comp.os.linux.security |
| Subject | Re: yet another IP blocklist (mine!) |
| Date | 2016-11-28 02:10 +0000 |
| Organization | Crash Test Dummy Training Academy |
| Message-ID | <slrno3n4i5.6ni.ibuprofin@planck.phx.az.us> (permalink) |
| References | (4 earlier) <MPG.327d9502ab733f6f989682@reader80.eternal-september.org> <slrno1a8cn.q8v.ibuprofin@planck.phx.az.us> <MPG.329ea37bff320fd4989681@news.albasani.net> <slrno3cfo3.gb2.ibuprofin@planck.phx.az.us> <MPG.32a3ddc17009d6e5989683@news.albasani.net> |
On Sat, 26 Nov 2016, in the Usenet newsgroup comp.os.linux.security, in article
<MPG.32a3ddc17009d6e5989683@news.albasani.net>, Supratim Sanyal wrote:
>ibuprofin@painkiller.example.tld.invalid says...
>> Last month, I enabled logging on the firewall for a day, and was
>> seeing an _average_ of 81 rather obvious 'bots per hour during the
>> entire period. Based on the RFC defined protocols, more than 95% of
>> the connection attempts I saw (1953 of 2029 in 24 hours) were 'bots.
>Made some progress. Looked deeper at one of my internet-facing OpenVMS
>VMs, clearly see "/bin/busybox MIRAI" forced right after the attempted
>password. I have OpenVMS logs already forwarded to a central linux
>syslog server, wrote a bash script to parse these and spoof pam
>privlog lines. fail2ban picks them up, and bans them as well as
>reports to blocklist.de ...
Seems like a waste of CPU cycles to me - how many sane people offer a
server on port 23 today (since... maybe 1999 or so)? Busybox itself
is not the problem - it's the idiots who fail to secure the boxes where
busybox is frequently a main tool - routers, DVDs, etc. Lately, I'm
also seeing an up-tick in connection attempts to 7547/tcp (the RomPager
web-server used on routers/DVD-players/etc.) which is another massive
security hole. Thing is, it's a moving target - two months ago, I was
seeing 30-50 hits/hour on 53413/udp (Netis/NetCore router backdoor),
while in the first several months of this year it was DDOS attacks
using mis-configured DNS servers (and in consequence, lots of hits on
53/udp looking for open nameservers).
>spam has gone down but will not disappear
'spam' is what you get in the mail - and actually, my received spam
levels have decreased over the past 15 years. I can't remember the
last time I was offered pills at lower costs, a lower interest rate on
the credit card/mortgage or multiple millions of $CURRENCY_UNITS from
the wife of the deceased dictator of Lower Whoositz or what-ever.
>OpenVMS logs the hostname after a lookup and reverse-DNS does not work
>for all of the hostnames it logs.
Used to was, ("man 5 hosts_access") we did reverse lookups to validate
any remote trying to connect:
PARANOID
Matches any host whose name does not match its address. When
tcpd is built with -DPARANOID (default mode), it drops requests
from such clients even before looking at the access control
tables. Build without -DPARANOID when you want more control
over such requests.
but I'm seeing a substantial number of ISPs that don't bother setting
up PTR records on their DNS. In the late-1980s when I was also doing
registrar duties and responsible for the division's DNS and NIS yellow
pages services, we had a Makefile ("man 1 make") that automagically
parsed the source hosts file we used to create the appropriate (DNS and
NIS) file entries from a single entry - it was assumed that an A record
in DNS (hostname to IP) would have a matching PTR record (IP to
hostname) as well as the "yp" files that are similar to looking in the
/etc/hosts files. The sub-domain I was responsible for had some 31000
IPv4 addresses to match up - which any idiot who know shell scripting
can handle. There was even a Perl script that was supplied with bind
(Berkeley Internet Name Daemon - the de-facto standard name server)
that would create the appropriate DNS zone files from a source file
that was formatted like /etc/hosts. ISPs seem to lack this caliber of
skill - I guess the drug crazed chimpanzees (hired because their 7
bananas/day wage is what the ISP can pay and still make a profit) they
are using as network administrators were not trained. Consequently, I
am used to seeing /12s (255.240.0.0) either return NXDOMAIN, SERVFAIL,
"localhost" or "." to any PTR lookup. Another source of the problem is
virtual hosts - when you have 100 hostname (A) records pointing to a
single IP, which name should your PTR record for that IP point to? You
may find the RFC "draft-ietf-dnsop-isp-ip6rdns" interesting. The
abstract for version -02 of the document reads
"Reverse DNS in IPv6 for Internet Service Providers", Lee Howard,
2016-07-18, <draft-ietf-dnsop-isp-ip6rdns-02.txt>
In IPv4, Internet Service Providers (ISPs) commonly provide IN-
ADDR.ARPA information for their customers by prepopulating the zone
with one PTR record for every available address. This practice does
not scale in IPv6. This document analyzes different approaches and
considerations for ISPs in managing the ip6.arpa zone for IPv6
address space assigned to many customers.
There are several paragraphs in that document (use a search engine, or
try "ftp search.ietf.org" and look in the /internet-drafts/ directory)
are discouraging, but when the smallest IPv6 address block being handed
out to end-users is a /96 (ffff:ffff:ffff:ffff:ffff:ffff:0000:0000 or
2^32 hosts), it's not unexpected.
Old guy
Back to comp.os.linux.security | Previous | Next — Previous in thread | Find similar
yet another IP blocklist (mine!) Supratim Sanyal <supratim@riseup.invalid> - 2016-10-03 11:42 -0400
Re: yet another IP blocklist (mine!) Moe Trin <ibuprofin@painkiller.example.tld.invalid> - 2016-10-04 20:32 +0000
Re: yet another IP blocklist (mine!) Supratim Sanyal <supratim@riseup.invalid> - 2016-10-27 20:27 -0400
Re: yet another IP blocklist (mine!) Moe Trin <ibuprofin@painkiller.example.tld.invalid> - 2016-10-28 21:10 +0000
Re: yet another IP blocklist (mine!) Supratim Sanyal <supratim@riseup.invalid> - 2016-10-28 18:02 -0400
Re: yet another IP blocklist (mine!) Moe Trin <ibuprofin@painkiller.example.tld.invalid> - 2016-10-29 22:24 +0000
Re: yet another IP blocklist (mine!) Supratim Sanyal <supratim@riseupnet.invalid.com> - 2016-11-22 18:49 -0500
Re: yet another IP blocklist (mine!) Moe Trin <ibuprofin@painkiller.example.tld.invalid> - 2016-11-24 01:13 +0000
Re: yet another IP blocklist (mine!) Supratim Sanyal <supratim@riseupnet.invalid.com> - 2016-11-26 17:59 -0500
Re: yet another IP blocklist (mine!) Moe Trin <ibuprofin@painkiller.example.tld.invalid> - 2016-11-28 02:10 +0000
csiph-web