SIGforum.com    Main Page  Hop To Forum Categories  The Lounge    Internet Server Operators: Heads Up
Go
New
Find
Notify
Tools
Reply
  
Internet Server Operators: Heads Up Login/Join 
Nullus Anxietas
Picture of ensigmatic
posted
This will come as no surprise to any who've been paying attention.

I just saw an automatic block on an abusive IP address lifted after over sixty hours. Without putting too fine a point on it: It takes a lot of repeated abuse to get listed for that long.

I've been operating servers exposed to the Internet since about the time the Internet first became accessible to non-Government-related entities. I've operated an Internet-facing server at home for eighteen years, and additional virtual servers for seven and three+ years, respectively.

In all that time I have never seen the aggressiveness and persistence of attacks on smtp and submission I've seen over the last couple weeks, and particularly over the last few days.

Most of these have originated from Baltic state and Hong Kong networks. The sixty-hour one, well...
$ whois 92.255.85.237
...
inetnum:        92.255.85.0 - 92.255.85.255
netname:        HK-CHANGWAY-20071224
country:        RU

A twofer: An HK company with network space in Russia.

(smtp and submission are about the only "attackable" services I expose to the 'net. Everything else is pretty-tightly locked-down with router ingress and egress rules.)

ETA: He just did it again: Now listed for 120 hours. I guess I'll just dump that entire netblock into a permanent deny listing...



"America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe
"If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher
 
Posts: 26009 | Location: S.E. Michigan | Registered: January 06, 2008Reply With QuoteReport This Post
Optimistic Cynic
Picture of architect
posted Hide Post
From curiosity, are these SYN floods or fully-opened TCP connection attacks? What SW are you using to recognize these and adjust the blocklists? Assuming you are running Postfix as your SMTP server, what messages does it log before the block kicks in?

With the originator on a /24 allocation, I would not think they are a particularly large organization. Or maybe space is not as tight in APNIC. (I think actually the opposite is true.)
 
Posts: 6892 | Location: NoVA | Registered: July 22, 2009Reply With QuoteReport This Post
Fire begets Fire
Picture of SIGnified
posted Hide Post
Things that make you go “hmmmn“





"Pacifism is a shifty doctrine under which a man accepts the benefits of the social group without being willing to pay - and claims a halo for his dishonesty."
~Robert A. Heinlein
 
Posts: 26758 | Location: dughouse | Registered: February 04, 2003Reply With QuoteReport This Post
Staring back
from the abyss
Picture of Gustofer
posted Hide Post
quote:
Originally posted by SIGnified:
Things that make you go “hmmmn“

I'm sure it's just a coincidence. Big Grin


________________________________________________________
"Great danger lies in the notion that we can reason with evil." Doug Patton.
 
Posts: 20860 | Location: Montana | Registered: November 01, 2010Reply With QuoteReport This Post
W07VH5
Picture of mark123
posted Hide Post
Anything us normies need to check? The only thing that I’ve got that’s internet facing is a pfsense box. I’m running snort and haven’t seen anything strange yet.
 
Posts: 45637 | Location: Pennsyltucky | Registered: December 05, 2001Reply With QuoteReport This Post
Nullus Anxietas
Picture of ensigmatic
posted Hide Post
quote:
Originally posted by architect:
From curiosity, are these SYN floods or fully-opened TCP connection attacks?
The latter.

quote:
Originally posted by architect:
What SW are you using to recognize these and adjust the blocklists?
I'm using sshguard, along with a regexp extension I'm writing for it.

quote:
Originally posted by architect:
Assuming you are running Postfix as your SMTP server, what messages does it log before the block kicks in?
A variety of them. Rapid and repeated connect/disconnect and auth fail attempts, for example.

Though, on closer examination, the foregoing IP address was blocked for persistent, aggressive attacks against sshd (Secure Shell), not smtp/submission (mail server). (Those have also ramped-up significantly.)

quote:
Originally posted by architect:
With the originator on a /24 allocation, I would not think they are a particularly large organization.
The sshd attacks have been widely-distributed for several years now. Since I use only Public Key Authentication for my SSH servers, these don't particularly concern me. (They're more annoying for the logging noise than anything else.)

As for the attacks from small netblocks: The attackers of all types are beginning to employ they same methods the SSH attackers have been using: Low-frequency attacks from distributed IPs (bot nets) in order to avoid automatic detection-and-blocking.

E.g.: On Mar 31 my home server experienced 3300 attempts from 762 unique IPs, 730 unique /24's.

quote:
Originally posted by mark123:
Anything us normies need to check?
That you're not using default accounts (e.g.: "admin") on any IoT devices, that anything that doesn't need exposure to the 'net is blocked at your Internet router, and that any passwords you use are complex and not re-used anywhere.

That's the easy stuff.



"America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe
"If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher
 
Posts: 26009 | Location: S.E. Michigan | Registered: January 06, 2008Reply With QuoteReport This Post
W07VH5
Picture of mark123
posted Hide Post
quote:
Originally posted by ensigmatic:
quote:
Originally posted by mark123:
Anything us normies need to check?
That you're not using default accounts (e.g.: "admin") on any IoT devices, that anything that doesn't need exposure to the 'net is blocked at your Internet router, and that any passwords you use are complex and not re-used anywhere.

That's the easy stuff.
I think the only IoT things are there security cameras, garage door opener and TVs. They’re all isolated on a separate VLAN. No default usernames or passwords.

Edit - oh, the automobiles will also connect to IoT VLAN for updates and such.
 
Posts: 45637 | Location: Pennsyltucky | Registered: December 05, 2001Reply With QuoteReport This Post
  Powered by Social Strata  
 

SIGforum.com    Main Page  Hop To Forum Categories  The Lounge    Internet Server Operators: Heads Up

© SIGforum 2024