LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-18-2006, 06:16 AM   #1
gabsik
Member
 
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567

Rep: Reputation: 30
Lightbulb Analize my hosts.deny


I have a debian sarge 3.1 2.6 i use portsentry to detect scans and log them.It does add the ip in the hosts.deny.I want you to have a look to this hosts.deny ip list which is full of ips coming from my isp's subnet i show you a sample:
ALL: 87.7.184.58
ALL: 87.7.51.231
ALL: 87.7.191.88
ALL: 87.7.254.159
ALL: 87.7.116.16
ALL: 87.7.210.154
ALL: 87.7.108.123
ALL: 87.7.13.230
ALL: 87.7.171.138
ALL: 87.7.49.196
ALL: 87.7.95.47
ALL: 87.7.80.213
ALL: 87.7.7.118
ALL: 87.7.95.37
ALL: 87.7.116.128

I don't think i was under an attak by my isp's users.I think they have been used as nmap DECOY,maybe,any ideas ?
 
Old 04-18-2006, 06:18 AM   #2
gabsik
Member
 
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567

Original Poster
Rep: Reputation: 30
Lightbulb Analize my hosts.deny

Why they come from he same subnet ?A conspiracy against me from 87.7.0.0 network?A DDOS?

Last edited by gabsik; 04-18-2006 at 08:43 AM.
 
Old 04-18-2006, 04:06 PM   #3
gabsik
Member
 
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567

Original Poster
Rep: Reputation: 30
Post Update:
This scans come regulary from the sames subnets that portsentry don't block them because already in hosts.deny list.
Maybe just a real security expert can help me about this or that 's the way scan go infact i'm just a 1 year sysadm old ...
 
Old 04-18-2006, 05:49 PM   #4
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
It could be a decoy or distributed scan, but I don't think that's very likely. Alot of windows malware are hard-coded to scan other machines on the local subnets or it could just be false positives. Do you know what ports are being scanned?
 
Old 04-19-2006, 12:04 AM   #5
gabsik
Member
 
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567

Original Poster
Rep: Reputation: 30
I have placed portsentry's "honeypots" on the netbios ports of the pubblic eth0,could be false positives if they were pubblic servers , what's the point of connecting to a pubblic samba share if not for crack it,right ?I will try configuring portsentry more relaxed but i believe more to the teory of a spammer-worm-ddos of some sorts because snort log samba-cups ports too ... (clear?)
 
Old 04-19-2006, 09:01 AM   #6
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
Windows machines generate a good amount of netbios traffic under normal circumstances and windows machines that are infected with common viruses/worms can do alot of netbios scanning. In fact the windows netbios ports are usually one of the top scanned ports on the internet.
 
Old 04-19-2006, 09:12 AM   #7
gabsik
Member
 
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567

Original Poster
Rep: Reputation: 30
Well legion scanner is a cult,still don't understand "my isp's subnet conspiracy" ... !I have samba shares in my lan and my dad's window machine which is always switched off,it's all well filtered.
I would like also to find a nice way with iptables to limit Netbios broadcasts coming from my DMZ.
iptables -A OUPUT -s $DMZ -d ! 192.168.1.255/30 -j ACCEPT
With subnet 30 i will limit broadcasts to reach just the firsts 2 hosts,right?Any better than this?

Last edited by gabsik; 04-19-2006 at 09:39 AM.
 
Old 04-19-2006, 09:17 AM   #8
nx5000
Senior Member
 
Registered: Sep 2005
Location: Out
Posts: 3,307

Rep: Reputation: 57
Is your ip in the same subnet?
As Capt_Caveman said, maybe you are hit by a virus trying only the local subnet. Could also be that all others are blocked by anti-spoofing/anti-netbios rules at your isp.
 
Old 04-19-2006, 01:32 PM   #9
gabsik
Member
 
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567

Original Poster
Rep: Reputation: 30
Yes it is the tim.it subnet ... 82.59.0.0 ... and it still goes on !!!

Last edited by gabsik; 04-20-2006 at 07:34 AM.
 
Old 04-28-2006, 03:13 AM   #10
gabsik
Member
 
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567

Original Poster
Rep: Reputation: 30
UPDATE:
Afther more than a mounth i keep on getting the same my isps' subnets hammering on the front eth0 netbios ports:
Apr 28 09:57:31 localhost ippl: loc-srv connection attempt from 87.10.183.52
Apr 28 09:57:31 localhost ippl: loc-srv connection attempt from 87.10.183.52
Apr 28 09:58:09 localhost ippl: loc-srv connection attempt from 87.10.78.16
Apr 28 09:58:09 localhost ippl: loc-srv connection attempt from 87.10.78.16
Apr 28 10:00:23 localhost ippl: loc-srv connection attempt from 87.10.248.128
Apr 28 10:00:23 localhost ippl: loc-srv connection attempt from 87.10.248.128
Apr 28 10:00:31 localhost ippl: loc-srv connection attempt from 87.10.165.214
Apr 28 10:00:31 localhost ippl: loc-srv connection attempt from 87.10.165.214
Apr 28 10:00:32 localhost ippl: loc-srv connection attempt from 87.11.248.98
Apr 28 10:00:32 localhost ippl: loc-srv connection attempt from 87.11.248.98
Apr 28 10:00:41 localhost ippl: loc-srv connection attempt from 87.17.98.147
Apr 28 10:00:41 localhost ippl: loc-srv connection attempt from 87.17.98.147
Apr 28 10:00:45 localhost ippl: loc-srv connection attempt from 87.10.172.206
Apr 28 10:00:45 localhost ippl: loc-srv connection attempt from 87.10.172.206
Apr 28 10:01:04 localhost ippl: loc-srv connection attempt from 87.10.180.200
Apr 28 10:01:04 localhost ippl: loc-srv connection attempt from 87.10.180.200

Is it a worm ?It's getting annoying!
 
Old 04-28-2006, 07:05 AM   #11
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
Quote:
Originally Posted by gabsik
Is it a worm ?
Probably. At any given moment on most ISPs network there are large numbers of windows machines infected with malware (worms/viruses) that perform scanning of local subnets and the netbios ports are always in the top scanned ports. Most people aren't aware of it, but that's the reality of todays internet.

If you are really curious, you can use ethereal or tcpdump to capture some of the packets (make sure to get a full dump of the payload and you might be able to narrow down the exact specious of malware. ALternatively you can setup a netcat listener on those ports, but I would recommend against that unless you know what you are doing.

It's getting annoying
You have their IP addresses. If it's coming from the same IPs or subnets you can use IP tables to ban them permanently.
 
Old 04-28-2006, 08:17 AM   #12
nx5000
Senior Member
 
Registered: Sep 2005
Location: Out
Posts: 3,307

Rep: Reputation: 57
You can use this, I've always wanted to try it but didn't yet as I have no connection at home, only at work:

http://labrea.sourceforge.net/labrea-info.html
 
Old 04-28-2006, 01:49 PM   #13
gabsik
Member
 
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567

Original Poster
Rep: Reputation: 30
Well i'm already playing with portsentry but blind i'm getting what you advised me,i will let you know !
 
Old 05-03-2006, 04:28 PM   #14
gabsik
Member
 
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567

Original Poster
Rep: Reputation: 30
I have read the INSTALL file in the laBrea.tar.gz it sounds it can mass up my routing tables and really looks like requires expert hands to play with !Have you tried it ?Any advice ?
 
Old 05-08-2006, 04:27 AM   #15
gabsik
Member
 
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567

Original Poster
Rep: Reputation: 30
UPDATE
Look this report from my router:
Mon, 2006-05-08 08:47:46 - TCP Packet - Source:87.7.108.35,4518 Destination:87.7.150.2,445 - [DOS]
Mon, 2006-05-08 08:47:49 - TCP Packet - Source:87.7.38.237,4720 Destination:87.7.150.2,445 - [DOS]
Mon, 2006-05-08 08:47:52 - Send E-mail Success!
Mon, 2006-05-08 08:59:27 - UDP Packet - Source:222.208.168.130,54068 Destination:87.7.150.2,1032 - [DOS]
Mon, 2006-05-08 08:59:31 - Send E-mail Success!
Mon, 2006-05-08 09:27:03 - LCP down....

This happens twice a day my connection goes down because this attacks.The list of ips is much longer than that with the majority coming from 85.38.0.0 or 87.37.0.0 networks.The route has a checkbox saying "protection aginst DOS attacks" but it dosn't seem to be working ,i'm desperate !!!!
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
/etc/hosts and hosts.deny question ilan1 Linux - Networking 4 03-04-2006 05:28 PM
hosts.allow & hosts.deny question... jonc Linux - Security 9 03-05-2005 09:41 PM
Adding shell commands to hosts.deny and hosts.allow ridertech Linux - Security 3 12-29-2003 03:52 PM
hosts.deny and hosts.allow defaults? gui10 Linux - Security 5 12-20-2001 01:57 AM
hosts.deny 98steve600 Linux - General 1 01-10-2001 07:39 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:51 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration