LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-04-2006, 11:44 AM   #1
mikeyt_333
Member
 
Registered: Jun 2001
Location: Up in the clouds
Distribution: Fedora et al.
Posts: 353

Rep: Reputation: 30
System under attack via FTP, trying to understand the intended action


I was hoping somebody might be able to interpret this log output from iptables. I blocked the offending IP because they were generating hundreds of unknown user log entries for ftp, I think they're probably hoping to DoS. I get lost when specific combinations of TCP flags are sent, in this case the ACK and PSH, I'm not sure why sending an ACK and PSH would cause any problems. Thanks for any insight you can provide, I appreciate it! To shorten the entry, I've removed repeated information from the beginning of each line, so each line begins with:

Code:
IN=eth0 OUT= MAC= SRC= DST=
With sensitive information removed.

Code:
LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=13584 DF PROTO=TCP SPT=51321 DPT=21 WINDOW=6732 RES=0x00 ACK PSH URGP=0
LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=13585 DF PROTO=TCP SPT=51321 DPT=21 WINDOW=6732 RES=0x00 ACK URGP=0
LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=13586 DF PROTO=TCP SPT=51321 DPT=21 WINDOW=6732 RES=0x00 ACK PSH URGP=0
LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=13587 DF PROTO=TCP SPT=51321 DPT=21 WINDOW=6732 RES=0x00 ACK URGP=0
LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=13588 DF PROTO=TCP SPT=51321 DPT=21 WINDOW=6732 RES=0x00 ACK PSH URGP=0
LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=13589 DF PROTO=TCP SPT=51321 DPT=21 WINDOW=6732 RES=0x00 ACK URGP=0
Thanks again!

Mike.
 
Old 05-05-2006, 04:04 AM   #2
nx5000
Senior Member
 
Registered: Sep 2005
Location: Out
Posts: 3,307

Rep: Reputation: 57
With this log we can't do much.
Put the complete log (all exchanges with timings) but make a replace on the IPs but don't remove them.
Seems like a DoS and you can't do much about it. Maybe improve your firewall settings would mitigate the effect.
 
Old 05-05-2006, 09:44 AM   #3
mikeyt_333
Member
 
Registered: Jun 2001
Location: Up in the clouds
Distribution: Fedora et al.
Posts: 353

Original Poster
Rep: Reputation: 30
Thanks for the reply! Here's a snippet of my messages log, the only thing that happened was hundreds of failed logins, and if they're DoS'ing, I would expect it to come from multiple IP's (but I may be way off base...). Thanks for your help!

Code:
May  4 09:46:16 [SERVER] vsftpd(pam_unix)[29801]: authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=[ATTACK IP]
May  4 09:46:20 [SERVER] vsftpd(pam_unix)[29801]: check pass; user unknown
May  4 09:46:20 [SERVER] vsftpd(pam_unix)[29801]: authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=[ATTACK IP]
May  4 09:46:27 [SERVER] vsftpd(pam_unix)[29801]: check pass; user unknown
May  4 09:46:27 [SERVER] vsftpd(pam_unix)[29801]: authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=[ATTACK IP]
May  4 09:46:31 [SERVER] vsftpd(pam_unix)[29801]: check pass; user unknown
May  4 09:46:31 [SERVER] vsftpd(pam_unix)[29801]: authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=[ATTACK IP]
May  4 09:46:35 [SERVER] vsftpd(pam_unix)[29801]: check pass; user unknown
May  4 09:46:35 [SERVER] vsftpd(pam_unix)[29801]: authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=[ATTACK IP]
May  4 09:46:39 [SERVER] vsftpd(pam_unix)[29801]: check pass; user unknown
May  4 09:46:39 [SERVER] vsftpd(pam_unix)[29801]: authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=[ATTACK IP]
May  4 09:46:43 [SERVER] vsftpd(pam_unix)[29801]: check pass; user unknown
As an immidiate, but temporary, fix, I've added the offending IP's to iptables, droping any connections from them. You mentioned that maybe better firewall rules would help, but that, are you refering to limiting connections etc...? The difficulty I have with setting a limit on connections is it already causes hell with SSH when people are running things that can't do connection multiplexing. FTP might be better since it doesn't intiate a ton of connections, but it's still possible that somebody might connect 10 times in 10 minutes, legitimately. Thanks for the input!!

Mike.

Last edited by mikeyt_333; 05-05-2006 at 09:48 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
This was intended to be the first one ;-) gtc1977 LinuxQuestions.org Member Intro 2 03-17-2006 04:07 PM
Don't quite understand The File Hierarchical System in Linux? jacatone Linux - Newbie 3 08-07-2005 09:55 PM
recent attack via phpBB, log files deleted? accessed file system outside /home/ enzo250gto Linux - Security 8 12-17-2004 01:51 PM
problem with ftp on mandrake 10.1 Official, ftp speeds system wide (anybody noticed?) equinox Mandriva 15 11-10-2004 02:07 PM
while loop not looping as intended Tarts Programming 7 11-28-2003 02:50 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:45 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration