LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-15-2016, 09:52 AM   #1
wert
LQ Newbie
 
Registered: Dec 2016
Posts: 2

Rep: Reputation: Disabled
Server used in UDP attack !Need Guidance


I have one wallpaper site that I brought keeps getting attacked recently and as I am newbie to sysadmin and linux stuff so it makes it even worse.

In september I was using hetzner and they blocked my ip and sent this log:http://pastebin.com/7ghVhvp8 I was using CentOS 7 with this tutorial: http://bit.ly/2hREs60 . After that I moved my other sites to linode.com and wallpaper site to OVh and it was working until few days back.

#First:
Our anti-spam protection layer has detected that your IP 192.99.33.142 is sending spam.

Destination IP: 183.79.16.119 - Message-ID: 74d33822d902d156306d2e39b5f4bbbe@ - Spam score: 500
Destination IP: 65.20.0.49 - Message-ID: 8569140d51f1cb122028e95fec15c25f@ - Spam score: 500
Destination IP: 65.20.0.49 - Message-ID: 161158af00da76e035282b967860845a@ - Spam score: 500
Destination IP: 184.150.200.82 - Message-ID: 976c517db1b015c4de91b549154cf905@ - Spam score: 500
Destination IP: 182.22.12.248 - Message-ID: 7b8df29f2b2c25c278d6b723ecb8ea53@ - Spam score: 500

#Then:
You can find the logs brought up by our system below which led to this alert.

- START OF ADDITIONAL INFORMATION -

Attack detail : 186Kpps/56Mbps
dateTime srcIp:srcPort dstIp:dstPort protocol flags bytes reason
2016.12.11 18:01:28 CET 192.99.33.142:51660 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:51660 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:60816 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:60816 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:51660 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:60816 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:51660 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:51660 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:60816 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:60816 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:43787 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:43787 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:51660 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:51660 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:51660 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:43787 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:43787 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:43787 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:51660 94.136.40.66:80 UDP --- 40 ATTACK:UDP
2016.12.11 18:01:28 CET 192.99.33.142:60816 94.136.40.66:80 UDP --- 40 ATTACK:UDP

Image: http://i.imgur.com/Gn4Qneq.png

( I was using debian 7 ispconfig3 with firewall enabled)

Since then I have reinstall the server, used ispconfig firewall, disabled smtp for now, hardened my wordpress and got paid cloudflare website firewall and now major problem seems to be solved.But today I received this message:
"Detection of an attack on IP address 192.99.33.142" I enabled "Im'under attack" on cloudflare I got "End of attack on IP address 192.99.33.142".

To avoid problems like this in the future:
1-Can someone guide me how I can put limits on outgoing udp packets being sent.
2-What is the most effective way to stop spam being sent.I have read about policyd after some googling.
3-Pls pardon my ignorance, but I will appreciate any advice as to how I can hardened my server against these sort of attacks.

Thanks..
 
Old 12-16-2016, 09:35 AM   #2
TenTenths
Senior Member
 
Registered: Aug 2011
Location: Dublin
Distribution: Centos 5 / 6 / 7
Posts: 3,475

Rep: Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553
What software are you using for your sites? Wordpress? Something hand built? Some random script you downloaded?

If your server is being used to generate spam and attack other servers then you need to address HOW and WHY this is happening rather than trying to mitigate it after the fact by "limit outgoing packets" and "stop spam being sent".

You need to do the whole internet a favour and work out what part of your set up is being exploited and work out a way to mitigate that.

If your sites are revenue generating then I'd suggest you find an experienced linux admin and pay them to sort out your mess.
 
Old 12-16-2016, 11:37 AM   #3
wert
LQ Newbie
 
Registered: Dec 2016
Posts: 2

Original Poster
Rep: Reputation: Disabled
Site is based on wordpress, I think the whole issue started when I started using ByREV WP-PICShield. I have followed security tutorials on server side security and I am not getting any issues now.but you are right its just a better option to hire experienced freelancer and had him diagnose the real issue. Thanks.
 
Old 12-16-2016, 12:45 PM   #4
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
http://codex.wordpress.org/Hardening_WordPress

files = 644
directories 755
Exceptions: cgi-related stuff.

owner seems to be a variable these days, but www-data:www-data is what I've used since, forever.

Typically, Addons/Plugins are the first suspect in my book.
/var/log/apache2/{access,error}.log also.

Outdated or insecure themes, and even Wordpress version.
Current shows 4.7 on Wordpress.

Last edited by Habitual; 12-16-2016 at 12:48 PM.
 
Old 12-16-2016, 06:31 PM   #5
end
Member
 
Registered: Aug 2016
Posts: 266

Rep: Reputation: Disabled
re

hy

do you have own srver at home or hosting. if you have own server at home i will help you secure best way i know with iptables. you dont need pay me anything.
if you have server at home can you post shematics hove is everything connected to router.
 
1 members found this post helpful.
Old 12-16-2016, 09:18 PM   #6
descendant_command
Senior Member
 
Registered: Mar 2012
Posts: 1,876

Rep: Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643
Quote:
Originally Posted by Habitual View Post
files = 644
directories 755
Exceptions: cgi-related stuff.

owner seems to be a variable these days, but www-data:www-data is what I've used since, forever.
Do you really want the webserver able to rewrite it's own content?
Best have it owned by some other user.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
NTP and 123/UDP attack? robolux Linux - Networking 1 10-23-2016 04:03 PM
How to be immune to basic UDP/any port attack flood? postcd Linux - Security 1 05-15-2014 08:57 AM
my debian server was used in a udp flood attack Darchi Linux - Security 4 04-05-2012 06:31 PM
iptables rules against udp flood and ddos attack callbiz Linux - Networking 12 02-19-2010 08:13 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:01 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration