LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 09-19-2012, 07:15 PM   #1
Gortex
Member
 
Registered: Nov 2005
Location: Enid Ok
Distribution: ubuntu 64 , debian , fedora core , vista ultimate 64, Winows 7 64 ultimate :p
Posts: 219

Rep: Reputation: 30
question about blocking a whole IP block


I keep getting these nice authentication failures that have a hostname of:
rhost=50-56-125-156.static.cloud-ips.com


I am trying to find out what the correct IP address range to block to filter all incoming connections to my network from the static.cloud-ips.com network..

So far I have been unsuccessful in finding out what there network address really is.

Whois didn't give much info,
nslookup has nothing,
dig had very little helpfull info.
 
Old 09-19-2012, 07:32 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
WHOIS (whob) says:
Organization: Rackspace (+Slicehost)
AS: 19994
Prefix: 50.56.0.0/17
..which ROBTEX confirms.
 
Old 09-19-2012, 08:57 PM   #3
Gortex
Member
 
Registered: Nov 2005
Location: Enid Ok
Distribution: ubuntu 64 , debian , fedora core , vista ultimate 64, Winows 7 64 ultimate :p
Posts: 219

Original Poster
Rep: Reputation: 30
Quote:
Originally Posted by unSpawn View Post
WHOIS (whob) says:
Organization: Rackspace (+Slicehost)
AS: 19994
Prefix: 50.56.0.0/17
..which ROBTEX confirms.
Thanks..
I tried to use just whois..
 
Old 09-19-2012, 09:33 PM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Actually that's not true. static.cloud-ips.com serves 3 prefixes: 50.56.128.0/17, 207.97.192.0/18 and 67.23.0.0/19, all Rackspace. I'm not saying that's complete wrt prefix coverage or that there aren't any other ranges in other ASN's.
 
1 members found this post helpful.
Old 09-20-2012, 07:42 AM   #5
Gortex
Member
 
Registered: Nov 2005
Location: Enid Ok
Distribution: ubuntu 64 , debian , fedora core , vista ultimate 64, Winows 7 64 ultimate :p
Posts: 219

Original Poster
Rep: Reputation: 30
Quote:
Originally Posted by unSpawn View Post
Actually that's not true. static.cloud-ips.com serves 3 prefixes: 50.56.128.0/17, 207.97.192.0/18 and 67.23.0.0/19, all Rackspace. I'm not saying that's complete wrt prefix coverage or that there aren't any other ranges in other ASN's.
Ill block all those too. Kinda strange that nothing is done about people abusing that service though. I seen plenty of articals on the internet complaining about people hiding behind cloud ip serveries doing this...
 
Old 09-20-2012, 08:12 AM   #6
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by Gortex View Post
Ill block all those too.
Practically speaking if you're going to block ranges or whole net blocks then for "established" ranges things don't change around but otherwise 0) be sure to check regularly if they're still valid and if there are any holes in a range and 1) don't clog up your filter table input chain with it but use the raw table. Even better: use ipset. It makes managing rules virtually painless.


Quote:
Originally Posted by Gortex View Post
Kinda strange that nothing is done about people abusing that service though. I seen plenty of articals on the internet complaining about people hiding behind cloud ip serveries doing this...
Sorry, doing what exactly? (Examples?)
 
Old 09-20-2012, 08:22 AM   #7
Gortex
Member
 
Registered: Nov 2005
Location: Enid Ok
Distribution: ubuntu 64 , debian , fedora core , vista ultimate 64, Winows 7 64 ultimate :p
Posts: 219

Original Poster
Rep: Reputation: 30
Quote:
Originally Posted by unSpawn View Post
Practically speaking if you're going to block ranges or whole net blocks then for "established" ranges things don't change around but otherwise 0) be sure to check regularly if they're still valid and if there are any holes in a range and 1) don't clog up your filter table input chain with it but use the raw table. Even better: use ipset. It makes managing rules virtually painless.



Sorry, doing what exactly? (Examples?)


well I got about 5000 hits from random addresses on there network, trying to brute force my SSH service.
Other people have other types of break in attempts they were reporting...
 
Old 09-20-2012, 08:23 AM   #8
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
Quote:
Originally Posted by Gortex View Post
I keep getting these nice authentication failures that have a hostname of:
rhost=50-56-125-156.static.cloud-ips.com
In attempt to answer the question you didn't ask: this type of occurrence underscores the importance of properly securing your system and applying your security in layers. By your post, I assume that you mean SSH authentication failures. While blocking the whole IP ranges may help cut down on some of the clutter, it does come with potential downsides and possible unintended consequences. For example, you may say that you would never login from XYZ domain, which may be true until you are staying at a hotel somewhere. Second, if these addresses are spoofed or making use of compromised systems, the attempts can easily come from somewhere else. Third, as unSpawn alluded to, IPv4 address ranges are somewhat dynamic and do change.

While I am not saying don't implement block lists (I myself do, especially with regards to emails), be sure that you are using them in conjunction with other, more reliable means of security.
Edit: Followup
Quote:
well I got about 5000 hits from random addresses on there network
Try fail2ban.

Last edited by Noway2; 09-20-2012 at 08:25 AM.
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Why non-blocking write would block usually? fengjuva Linux - Software 5 08-18-2011 05:31 AM
hot to block gmail without blocking https in SQUID Sharia Linux - Server 1 04-08-2010 06:09 AM
How to block QQ messenger by blocking IPs rikijpn General 12 01-31-2010 07:22 AM
Web page ad blocking: Privoxy vs Ad-block. Thoughts? Kropotkin Linux - Software 1 07-22-2005 07:05 AM
blocking via IP? and names on my block list still messege me. AnimaSola Linux - Software 1 02-03-2005 08:26 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:04 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration