LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-28-2014, 06:55 PM   #1
rowedahelicon
LQ Newbie
 
Registered: Jul 2014
Location: The Internet
Distribution: Ubuntu 12.04
Posts: 4

Rep: Reputation: Disabled
Having bandwidth stolen by Chinese IP's, how do I combat it?


Hello everyone! First post and sadly it's not under good pre-tenses. My Linux server has been under attack off and on the last few days by a series of Chinese ip addresses, I'm not entirely sure what they are doing and how they are doing it.

My host beleived it was a possible error in my DNS settings, currently, there is no dns information included in my resolv.conf (I took it out just to test this) , my SSH password is secure but fail2ban has stopped trying to ban them. I'm unsure what logs to provide or what to look at.

I'm pretty stumped here and could appreciate the help! I am running Ubuntu 12.04


0746CC-XEON => 61.164.113.107 168Mb 161Mb 77.8Mb
<=

The ip address of the server is : 205.234.153.146 it appears to pass any dns reclusion tests. I pulled this up earlier from IPTraf as well.

http://i.imgur.com/XXOTX6P.png
 
Old 07-28-2014, 07:59 PM   #2
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,978

Rep: Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624
At this point, unless someone has a less drastic move, I might suggest taking it offline. A new clean install (or maybe current lts) and put online long enough to add in patches and then add back apps and data. It could be that there is issue with your data in the form of a rootkit or even some virus. The entire web is under attack. Not sure there is a known way to stop all of it.

Last edited by jefro; 07-29-2014 at 07:26 PM.
 
Old 07-28-2014, 08:00 PM   #3
rowedahelicon
LQ Newbie
 
Registered: Jul 2014
Location: The Internet
Distribution: Ubuntu 12.04
Posts: 4

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by jefro View Post
At this point, unless someone has a less drastic move, I might suggest taking it offline. A new clean install (or many current lts) and put online long enough to add in patches and then add back apps and data. It could be that there is issue with your data in the form of a rootkit or even some virus. The entire web is under attack. Not sure there is a known way to stop all of it.
If there was a rootkit involved, would it be possible to find and destroy it?
 
Old 07-28-2014, 08:34 PM   #4
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS,Manjaro
Posts: 5,617

Rep: Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695
Rootkit

I have not found it productive to fight a rootkit. There are too many variations that are entirely too good at finding ways to hide. I have recovered by replacing with a new build or by installing clean and restoring from backup. ( I HOPE you have several generations of backup! )

On my home network I have long offered a honeypot or two that 'APPEAR" vulnerable. After a number of breakin attempts they send the detected characteristics to my firewall and the criminals get blocked at the gate. I build the honeypots as virtuals and reload them periodicly form read-only images so that if a breaking is successful (unlikley, but I am not perfect so possible) the impact is strictly limited. So far, this has protected my 'real' servers nicely.
 
Old 07-28-2014, 08:42 PM   #5
rowedahelicon
LQ Newbie
 
Registered: Jul 2014
Location: The Internet
Distribution: Ubuntu 12.04
Posts: 4

Original Poster
Rep: Reputation: Disabled
Well sure enough, I did some digging and hey! Rootkit found.
Now that I know that it was that I'm not worried, I can just backup what I need, clean it and start over.

I was worried that I was doing something wrong as far as blocking the incoming stuff went, I'm still somewhat new to all of this and I was really upset at myself for missing some huge obvious thing.

I know how the kit got in there, quick stupidity on my part, but nothing that I know not to make happen again. Thanks for the quick help guys, I really appreciate it!
 
Old 07-28-2014, 09:04 PM   #6
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,321
Blog Entries: 28

Rep: Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141
See the "Toolbox" section of the shownotes from episode 130 of the Sunday Morning Linux Review. It might help.

http://smlr.us/?p=4142
 
Old 07-29-2014, 04:46 PM   #7
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by rowedahelicon View Post
Well sure enough, I did some digging and hey! Rootkit found.
Which one as it? Or if you don't know exactly which files got modified?


Quote:
Originally Posted by rowedahelicon View Post
Now that I know that it was that I'm not worried, I can just backup what I need, clean it and start over.
Kind of depends on what was installed and how long it was there in the first place. If root owned files got changed then you'll have to inform users, change all credentials and about the only things you can safely copy are those whose contents you can read and verify.


Quote:
Originally Posted by rowedahelicon View Post
I know how the kit got in there, quick stupidity on my part, but nothing that I know not to make happen again.
For some reading their distributions installation and security documentation, properly hardening and regularly auditing the machine, following best practices and using common sense goes a long way, for others it's back to the School of Hard Knocks until they (eventually) graduate ;-p
 
Old 07-29-2014, 07:30 PM   #8
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,978

Rep: Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624Reputation: 3624
Plenty of us have been down the hard knock road. It hurts.

I'll second the question of which one and how did you find it?

Also how do you feel you let it on?
 
Old 07-30-2014, 04:21 AM   #9
rowedahelicon
LQ Newbie
 
Registered: Jul 2014
Location: The Internet
Distribution: Ubuntu 12.04
Posts: 4

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by jefro View Post
Plenty of us have been down the hard knock road. It hurts.

I'll second the question of which one and how did you find it?

Also how do you feel you let it on?
I can't get a name anywhere, but it's basically this one http://news.drweb.com/show/?i=5801&lng=en&c=5

Using two different rootkit chckers, I found warnings on both and logs pointed at >usr/bin/bsd-port/getty being a hidden process. And while I'm very good with my security for the most part, I let it on with a bad root password, we had it set to something simple just for an hour or to do a test on something. That's why I'm not even mad, very horrible mistake but if anything given how recent this rootkit is, use it as a good example of how quickly things can go south
 
Old 07-31-2014, 02:20 PM   #10
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by rowedahelicon View Post
I can't get a name anywhere, but
I don't need a name either, just a list of file names (or better: contact me and discuss dropping off copies).


Quote:
Originally Posted by rowedahelicon View Post
And while I'm very good with my security for the most part, I let it on with a bad root password,
After the fact but you should know that best practices tell you that a) you don't allow root to ever login over a network, and b) you don't need to use weak passwords to be able to test something.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] where to set to display chinese chinese characters vitalstrike82 Slackware 4 11-17-2012 02:38 AM
Support Chinese in fedora 17, and Chinese input software happycoder Linux - Newbie 1 08-25-2012 11:28 AM
Print Chinese on FC6 with OOo 3.0.1 & Chinese font is installed powah Linux - Software 0 04-17-2009 12:50 PM
displaying STOLEN packets stolen using NF_STOLEN venkatesh111 Linux - Networking 0 04-05-2006 01:02 AM
Vsftpd - how to limit download bandwidth but unlimited upload bandwidth? mpls mikeg Linux - Software 3 08-13-2005 01:52 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:08 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration