LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-22-2007, 04:47 AM   #1
librano
Member
 
Registered: Jul 2004
Location: Here, there and everywhere.
Distribution: Arch+KDE, Linux Mint Fluxbox CE
Posts: 163

Rep: Reputation: 31
Question Alleged flood attack from my Ubuntu server.


Hello everybody!

I need some help with an alleged flood attack from my IP address. My knowledge of Linux is beginner towards average (just as a gauge as to how easy or complicated your answers should/would be)

I am running a headless Ubuntu 7.04 server which is up to date. This box is a router/gateway machine for my home network. Services on the server include LAMP server (default Ubuntu settings with a few modifications: MySQL not network enabled, etc), Squid transparent proxy server, BIND DNS server, Samba filesharing to LAN only (with login and password), FTP file sharing to LAN only (with login and password), SSH accessible only from LAN (for admin purposes), Webmin accessible only from LAN (for admin purposes), as a firewall I am using Shorewall which allows full access from LAN. From the internet open ports are for Apache and a few ports forwarded to machines on the LAN (mainly for p2p applications). On my LAN I have 2 boxes: one Ubuntu 6.06 and another Windows XP with antivirus and firewall.

As you can see I think I have taken quite a few security measures. However, last night I got a call from my ISP saying that there is a flood attack coming from my IP address. I immediately ifdown-ed the external interface and closed all external ports on Shorewall. I also turned off all non-essential services and only left SSH, Webmin, Squid, BIND DNS, Shorewall only with port redirects for transparent proxying. I restarted the external interface and traffic was only 3kb/s max at idle (no browsing).

Today morning I got another call and my ISP saying that the flood attack is still coming from my IP address and that I they are going to change my IP address (which they did). They told me to check my computer for the malicious software. Being windows-centric their suggestion was to scan for viruses. The only info I could squeeze out of the lady was that there was a flood attack from my IP address.

Now my questions? What is going on? Is it really malicious software running on my Ubuntu server? What about the Windows box on my LAN? How can I verify this and make sure that there is no malicious software on my Linux machines? Is this just some guying spoofing an attack from my IP address?

Any help you can offer will be greatly appreciated. If you require any extra information I am glad to provide it. Thanks you.

lib.
 
Old 05-22-2007, 06:52 AM   #2
rcase5
Member
 
Registered: Apr 2004
Distribution: Fedora & Debian
Posts: 38

Rep: Reputation: 15
Not keen on using servers as firewalls

I personally am not big on using actual servers as routers/firewalls. While you can do some very sophisticated things with them, that advantage can also very quickly turn into a disadvantage. Because you can do so much with them, it's just that much more that can go wrong with them.

You neglected to state the specifics of your Internet connection. I'm presuming it's some kind of DSL, but you might want to elaborate.

Most high-speed Internet connections come with some kind of router, though not all. If yours is one of those ISPs that ships a DSL modem with no router, I would suggest you go out and get yourself a router. They aren't that expensive, and their lack of sophistication will lessen the likelihood that someone would be able to exploit a weakness on your gateway. If you do have DSL modem/router combo, chances are that it comes with a firewall. I HIGHLY suggest you turn on your router's firewall and use it, opening only the ports you want to access from the outside (SSH, HTTP, etc.).

As for the actual flood attack, just because you are part of a flood attack doesn't mean it's coming from your gateway system. I was inadvertently part of a flood attack and the culprit was one of my systems behind my router/firewall. Your gateway server may not be the problem (yes, even though I just suggested that it might be). It could be any system on your network. So I would definitely look into your Windows XP system. Just because it has anti-virus and a firewall doesn't mean it couldn't be part of a flood attack.

You also neglected to mention what kind of DNS you are running. If you are running recursive (caching) DNS, you should make sure it will only do recursive DNS for your internal network. When I was inadvertently part of a flood attack, I had a system that was running Authoritative DNS, but I neglected to turn off the recursive DNS, and someone was using it to flood bomb someone. I turned off recursive DNS on that system, and the problem went away. If your gateway is running only recursive DNS, I would simply close port 53 to the outside world and be done with it. But if you are running Authoritative DNS, make sure you turn off recursive DNS (NEVER run recursive and authoritative DNS on the same system!) on your gateway. It's very easy to exploit if you have that open.

That's all I have for now. Hope this helps.

Robert...
 
Old 05-22-2007, 01:51 PM   #3
hackintosh
Member
 
Registered: Dec 2005
Posts: 52

Rep: Reputation: 15
see ur log, any problem or not. If Yes, please post up for discuss and learning purpose.

Thanks
 
Old 05-22-2007, 02:09 PM   #4
anomie
Senior Member
 
Registered: Nov 2004
Location: Texas
Distribution: RHEL, Scientific Linux, Debian, Fedora
Posts: 3,935
Blog Entries: 5

Rep: Reputation: Disabled
Quote:
Originally Posted by librano
Is it really malicious software running on my Ubuntu server? What about the Windows box on my LAN?
You're running a lot of services on that ubuntu box -- this analysis would be greatly simplified if you were keeping track of binaries and configuration files using a HIDS (like aide, for example).

As it is, you can first install and run rkhunter to see if there is any evidence of a rootkit (or other suspicious situations) on your box.

If that doesn't reveal anything, I'd start by quarantining the Windows box (via iptables rules or by simply shutting it off) and see if the flood of traffic stops. How will you know if it stops? Monitor your network interfaces using netstat and/or tcpdump or wireshark.

An example netstat invocation on a Linux box should look something like:
Code:
$ netstat -in -I eth0 2
If the traffic drops substantially after quarantining Mr. Windows, then you've likely found the culprit. Using tcpdump or wireshark will give you more finely detailed information on the packets, where they're going, and what they contain.

Anyway, that's enough for now. Let us know how it's going.
 
Old 05-24-2007, 04:02 AM   #5
librano
Member
 
Registered: Jul 2004
Location: Here, there and everywhere.
Distribution: Arch+KDE, Linux Mint Fluxbox CE
Posts: 163

Original Poster
Rep: Reputation: 31
hello all

sorry for the delayed reply. my ISPs router had been giving me problems with my new IP address. a page like this one would take 10 minutes to load... anyway that is sorted now...

what i have come up with so far on this matter is that the flooding from my IP address stopped after i had been moved to the new IP address. this leads me to think that somebody was using my DNS server to perform these attacks. I am not very well versed when it comes to DNS servers but from what i have read, this would be caused by a recursive DNS server.

the installation of BIND was with the default settings of Ubuntu 7.04. ie. during installation i selected to install DNS and LAMP servers. this makes me wonder if the default Ubuntu server install has some security flaws.

Concerning my logs, i did not notice anything i would find suspicious... however, i know next to nothing about logs.

here are my BIND configurations.

Code:
options {
	directory "/var/cache/bind";


	auth-nxdomain no;    # conform to RFC1035
	listen-on-v6 { any; };

	allow-recursion { localnets; };

	forwarders {
		<extarnal DNS server1>;
		<extarnal DNS server2>
                <extarnal DNS server3>;
		};
	forward first;
};
as you can see recursion is only allowed to localnets which i suppose means 127.0.0.1 so i dont know how the attack would have taken place.

here is my shorewall rules file.

Code:
#p2p to Ubuntu box
DNAT	net	loc:192.168.0.2	tcp	1213	-	<my-external-IP-address>
DNAT	net	loc:192.168.0.2	tcp	1355	-	<my-external-IP-address>
DNAT	net	loc:192.168.0.2	tcp	2441	-	<my-external-IP-address>
DNAT	net	loc:192.168.0.2	tcp	3941	-	<my-external-IP-address>

#p2p to Ubuntu box
DNAT	net	loc:192.168.0.2	tcp	57571	-	<my-external-IP-address>

#p2p to windows box
DNAT	net	loc:192.168.0.3	tcp	15051	-	<my-external-IP-address>

#torrentflux
ACCEPT	net	$FW	tcp	40000:40007

#apache
ACCEPT	net	$FW	tcp	80,443

#squid transparent proxy redirect
REDIRECT	loc	3128	tcp	www
again you will notice that the only external port open on my router/server is the apache port. the rest are port forwards to internal boxes.

in general the log files that have had network logs look like this. this one is from my syslog

Code:
May 23 18:00:00 server kernel: [119882.920678] BANDWIDTH_IN:IN=eth0 OUT=eth1 SRC=<some-IP-address> DST=192.168.0.3 LEN=60 TOS=0x00 PREC=0x00 TTL=243 ID=971 PROTO=ICMP TYPE=0 CODE=0 ID=512 SEQ=21779 
May 23 18:00:01 server kernel: [119883.897958] BANDWIDTH_OUT:IN=eth1 OUT=eth0 SRC=192.168.0.3 DST=<some-IP-address> LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=972 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=22035 
May 23 18:00:01 server kernel: [119883.923202] BANDWIDTH_IN:IN=eth0 OUT=eth1 SRC=<some-IP-address> DST=192.168.0.3 LEN=60 TOS=0x00 PREC=0x00 TTL=243 ID=972 PROTO=ICMP TYPE=0 CODE=0 ID=512 SEQ=22035 
May 23 18:00:02 server /USR/SBIN/CRON[25898]: (root) CMD (/etc/webmin/bandwidth/rotate.pl)
May 23 18:00:02 server kernel: [119884.897837] BANDWIDTH_OUT:IN=eth1 OUT=eth0 SRC=192.168.0.3 DST=<some-IP-address> LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=973 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=22291 
May 23 18:00:02 server kernel: [119884.922457] BANDWIDTH_IN:IN=eth0 OUT=eth1 SRC=<some-IP-address> DST=192.168.0.3 LEN=60 TOS=0x00 PREC=0x00 TTL=243 ID=973 PROTO=ICMP TYPE=0 CODE=0 ID=512 SEQ=22291 
May 23 18:00:03 server kernel: [119885.897620] BANDWIDTH_OUT:IN=eth1 OUT=eth0 SRC=192.168.0.3 DST=<some-IP-address> LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=976 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=22547 
May 23 18:00:03 server kernel: [119885.922147] BANDWIDTH_IN:IN=eth0 OUT=eth1 SRC=<some-IP-address> DST=192.168.0.3 LEN=60 TOS=0x00 PREC=0x00 TTL=243 ID=976 PROTO=ICMP TYPE=0 CODE=0 ID=512 SEQ=22547 
May 23 18:00:04 server kernel: [119886.898372] BANDWIDTH_OUT:IN=eth1 OUT=eth0 SRC=192.168.0.3 DST=<some-IP-address> LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=977 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=22803 
May 23 18:00:04 server kernel: [119886.922611] BANDWIDTH_IN:IN=eth0 OUT=eth1 SRC=<some-IP-address> DST=192.168.0.3 LEN=60 TOS=0x00 PREC=0x00 TTL=243 ID=977 PROTO=ICMP TYPE=0 CODE=0 ID=512 SEQ=22803 
May 23 18:00:05 server kernel: [119887.898176] BANDWIDTH_OUT:IN=eth1 OUT=eth0 SRC=192.168.0.3 DST=<some-IP-address> LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=978 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=23059 
May 23 18:00:05 server kernel: [119887.922549] BANDWIDTH_IN:IN=eth0 OUT=eth1 SRC=<some-IP-address> DST=192.168.0.3 LEN=60 TOS=0x00 PREC=0x00 TTL=243 ID=978 PROTO=ICMP TYPE=0 CODE=0 ID=512 SEQ=23059 
May 23 18:00:06 server kernel: [119888.900042] BANDWIDTH_OUT:IN=eth1 OUT=eth0 SRC=192.168.0.3 DST=<some-IP-address> LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=979 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=23315 
May 23 18:00:07 server kernel: [119888.924681] BANDWIDTH_IN:IN=eth0 OUT=eth1 SRC=<some-IP-address> DST=192.168.0.3 LEN=60 TOS=0x00 PREC=0x00 TTL=243 ID=979 PROTO=ICMP TYPE=0 CODE=0 ID=512 SEQ=23315 
May 23 18:00:07 server kernel: [119889.899859] BANDWIDTH_OUT:IN=eth1 OUT=eth0 SRC=192.168.0.3 DST=<some-IP-address> LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=980 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=23571 
May 23 18:00:07 server kernel: [119889.923548] BANDWIDTH_IN:IN=eth0 OUT=eth1 SRC=<some-IP-address> DST=192.168.0.3 LEN=60 TOS=0x00 PREC=0x00 TTL=243 ID=980 PROTO=ICMP TYPE=0 CODE=0 ID=512 SEQ=23571 
May 23 18:00:07 server kernel: [119890.015080] BANDWIDTH_OUT:IN=eth1 OUT=eth0 SRC=192.168.0.2 DST=<some-IP-address> LEN=72 TOS=0x00 PREC=0x00 TTL=63 ID=14368 DF PROTO=TCP SPT=38162 DPT=5050 WINDOW=5050 RES=0x00 ACK PSH URGP=0 
May 23 18:00:08 server kernel: [119890.220299] BANDWIDTH_IN:IN=eth0 OUT=eth1 SRC=<some-IP-address> DST=192.168.0.2 LEN=52 TOS=0x00 PREC=0x00 TTL=47 ID=29157 DF PROTO=TCP SPT=5050 DPT=38162 WINDOW=33304 RES=0x00 ACK URGP=0 
May 23 18:00:08 server kernel: [119890.900561] BANDWIDTH_OUT:IN=eth1 OUT=eth0 SRC=192.168.0.3 DST=<some-IP-address> LEN=60 TOS=0x00 PREC=0x00 TTL=127 ID=981 PROTO=ICMP TYPE=8 CODE=0 ID=512 SEQ=23827
i couldn't figure out how to work netstat but the problem went away by the time i had the internet up and running... so there wasnt much incentive.

hope i have given enough information to kick up a discussion. if you need more information please ask.

if you see any discrepancies or a cause for this attack please post so that i can avoid future attacks... and maybe help others using Ubuntu as a server.

thanks for your help and suggestions.

lib.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Logitech Attack 3 Joystick in Ubuntu discourse Ubuntu 5 12-11-2006 11:34 AM
Server Attack jitenagr Linux - Server 5 11-10-2006 06:50 AM
LXer: Suspected Weekend Hacker Attack on Ubuntu LXer Syndicated Linux News 0 07-23-2006 12:21 PM
"syn flood attack" How do I investigate this? oily_rags SUSE / openSUSE 2 04-28-2005 09:29 PM
Syn Flood Attack Detect synaptical Linux - Security 2 07-25-2004 01:48 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:33 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration