Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
|
04-18-2006, 06:16 AM
|
#1
|
Member
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567
Rep:
|
Analize my hosts.deny
I have a debian sarge 3.1 2.6 i use portsentry to detect scans and log them.It does add the ip in the hosts.deny.I want you to have a look to this hosts.deny ip list which is full of ips coming from my isp's subnet i show you a sample:
ALL: 87.7.184.58
ALL: 87.7.51.231
ALL: 87.7.191.88
ALL: 87.7.254.159
ALL: 87.7.116.16
ALL: 87.7.210.154
ALL: 87.7.108.123
ALL: 87.7.13.230
ALL: 87.7.171.138
ALL: 87.7.49.196
ALL: 87.7.95.47
ALL: 87.7.80.213
ALL: 87.7.7.118
ALL: 87.7.95.37
ALL: 87.7.116.128
I don't think i was under an attak by my isp's users.I think they have been used as nmap DECOY,maybe,any ideas ? 
|
|
|
04-18-2006, 06:18 AM
|
#2
|
Member
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567
Original Poster
Rep:
|
Analize my hosts.deny
Why they come from he same subnet ?A conspiracy against me from 87.7.0.0 network?A DDOS?
Last edited by gabsik; 04-18-2006 at 08:43 AM.
|
|
|
04-18-2006, 04:06 PM
|
#3
|
Member
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567
Original Poster
Rep:
|
Post Update:
This scans come regulary from the sames subnets that portsentry don't block them because already in hosts.deny list.
Maybe just a real security expert can help me about this or that 's the way scan go infact i'm just a 1 year sysadm old ...
|
|
|
04-18-2006, 05:49 PM
|
#4
|
Senior Member
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658
Rep:
|
It could be a decoy or distributed scan, but I don't think that's very likely. Alot of windows malware are hard-coded to scan other machines on the local subnets or it could just be false positives. Do you know what ports are being scanned?
|
|
|
04-19-2006, 12:04 AM
|
#5
|
Member
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567
Original Poster
Rep:
|
I have placed portsentry's "honeypots" on the netbios ports of the pubblic eth0,could be false positives if they were pubblic servers , what's the point of connecting to a pubblic samba share if not for crack it,right ?I will try configuring portsentry more relaxed but i believe more to the teory of a spammer-worm-ddos of some sorts because snort log samba-cups ports too ... (clear?)
|
|
|
04-19-2006, 09:01 AM
|
#6
|
Senior Member
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658
Rep:
|
Windows machines generate a good amount of netbios traffic under normal circumstances and windows machines that are infected with common viruses/worms can do alot of netbios scanning. In fact the windows netbios ports are usually one of the top scanned ports on the internet.
|
|
|
04-19-2006, 09:12 AM
|
#7
|
Member
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567
Original Poster
Rep:
|
Well legion scanner is a cult,still don't understand "my isp's subnet conspiracy" ... !I have samba shares in my lan and my dad's window machine which is always switched off,it's all well filtered.
I would like also to find a nice way with iptables to limit Netbios broadcasts coming from my DMZ.
iptables -A OUPUT -s $DMZ -d ! 192.168.1.255/30 -j ACCEPT
With subnet 30 i will limit broadcasts to reach just the firsts 2 hosts,right?Any better than this?
Last edited by gabsik; 04-19-2006 at 09:39 AM.
|
|
|
04-19-2006, 09:17 AM
|
#8
|
Senior Member
Registered: Sep 2005
Location: Out
Posts: 3,307
Rep:
|
Is your ip in the same subnet?
As Capt_Caveman said, maybe you are hit by a virus trying only the local subnet. Could also be that all others are blocked by anti-spoofing/anti-netbios rules at your isp.
|
|
|
04-19-2006, 01:32 PM
|
#9
|
Member
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567
Original Poster
Rep:
|
Yes it is the tim.it subnet ... 82.59.0.0 ... and it still goes on !!!
Last edited by gabsik; 04-20-2006 at 07:34 AM.
|
|
|
04-28-2006, 03:13 AM
|
#10
|
Member
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567
Original Poster
Rep:
|
UPDATE:
Afther more than a mounth i keep on getting the same my isps' subnets hammering on the front eth0 netbios ports:
Apr 28 09:57:31 localhost ippl: loc-srv connection attempt from 87.10.183.52
Apr 28 09:57:31 localhost ippl: loc-srv connection attempt from 87.10.183.52
Apr 28 09:58:09 localhost ippl: loc-srv connection attempt from 87.10.78.16
Apr 28 09:58:09 localhost ippl: loc-srv connection attempt from 87.10.78.16
Apr 28 10:00:23 localhost ippl: loc-srv connection attempt from 87.10.248.128
Apr 28 10:00:23 localhost ippl: loc-srv connection attempt from 87.10.248.128
Apr 28 10:00:31 localhost ippl: loc-srv connection attempt from 87.10.165.214
Apr 28 10:00:31 localhost ippl: loc-srv connection attempt from 87.10.165.214
Apr 28 10:00:32 localhost ippl: loc-srv connection attempt from 87.11.248.98
Apr 28 10:00:32 localhost ippl: loc-srv connection attempt from 87.11.248.98
Apr 28 10:00:41 localhost ippl: loc-srv connection attempt from 87.17.98.147
Apr 28 10:00:41 localhost ippl: loc-srv connection attempt from 87.17.98.147
Apr 28 10:00:45 localhost ippl: loc-srv connection attempt from 87.10.172.206
Apr 28 10:00:45 localhost ippl: loc-srv connection attempt from 87.10.172.206
Apr 28 10:01:04 localhost ippl: loc-srv connection attempt from 87.10.180.200
Apr 28 10:01:04 localhost ippl: loc-srv connection attempt from 87.10.180.200
Is it a worm ?It's getting annoying!
|
|
|
04-28-2006, 07:05 AM
|
#11
|
Senior Member
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658
Rep:
|
Quote:
Originally Posted by gabsik
Is it a worm ?
|
Probably. At any given moment on most ISPs network there are large numbers of windows machines infected with malware (worms/viruses) that perform scanning of local subnets and the netbios ports are always in the top scanned ports. Most people aren't aware of it, but that's the reality of todays internet.
If you are really curious, you can use ethereal or tcpdump to capture some of the packets (make sure to get a full dump of the payload and you might be able to narrow down the exact specious of malware. ALternatively you can setup a netcat listener on those ports, but I would recommend against that unless you know what you are doing.
It's getting annoying
You have their IP addresses. If it's coming from the same IPs or subnets you can use IP tables to ban them permanently.
|
|
|
04-28-2006, 08:17 AM
|
#12
|
Senior Member
Registered: Sep 2005
Location: Out
Posts: 3,307
Rep:
|
You can use this, I've always wanted to try it but didn't yet as I have no connection at home, only at work:
http://labrea.sourceforge.net/labrea-info.html
|
|
|
04-28-2006, 01:49 PM
|
#13
|
Member
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567
Original Poster
Rep:
|
Well i'm already playing with portsentry but blind i'm getting what you advised me,i will let you know !
|
|
|
05-03-2006, 04:28 PM
|
#14
|
Member
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567
Original Poster
Rep:
|
I have read the INSTALL file in the laBrea.tar.gz it sounds it can mass up my routing tables and really looks like requires expert hands to play with !Have you tried it ?Any advice ?
|
|
|
05-08-2006, 04:27 AM
|
#15
|
Member
Registered: Dec 2005
Location: This planet
Distribution: Debian,Xubuntu
Posts: 567
Original Poster
Rep:
|
UPDATE
Look this report from my router:
Mon, 2006-05-08 08:47:46 - TCP Packet - Source:87.7.108.35,4518 Destination:87.7.150.2,445 - [DOS]
Mon, 2006-05-08 08:47:49 - TCP Packet - Source:87.7.38.237,4720 Destination:87.7.150.2,445 - [DOS]
Mon, 2006-05-08 08:47:52 - Send E-mail Success!
Mon, 2006-05-08 08:59:27 - UDP Packet - Source:222.208.168.130,54068 Destination:87.7.150.2,1032 - [DOS]
Mon, 2006-05-08 08:59:31 - Send E-mail Success!
Mon, 2006-05-08 09:27:03 - LCP down....
This happens twice a day my connection goes down because this attacks.The list of ips is much longer than that with the majority coming from 85.38.0.0 or 87.37.0.0 networks.The route has a checkbox saying "protection aginst DOS attacks" but it dosn't seem to be working ,i'm desperate !!!!
|
|
|
All times are GMT -5. The time now is 06:51 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|