From: Vahis on
On 2010-04-18, houghi <houghi(a)houghi.org.invalid> wrote:
> Vahis wrote:
>>>> Say a machine attempts like ten times and a script sends mail to their
>>>> abuse mail address.
>>>
>>> OK, the sending.
>>
>> And blocking. Both automagic.
>
> OK, I will send a mail to abuse at elisa.fi to block 88.112.24.179

I meant that the script would block the address in my machine like
blockhosts does and then send mail to the provider of that IP.

> Need a log proof?

I thought they did so last time I sent some provider (years ago) an email
to see what happens. I attached a log excerpt as proof.

I never asked them to do anything, I just made them aware of an
address(es) abusing by brute force attacks.

> Apr 18 11:10:18 penne sshd[32277]: Invalid user update from 88.112.24.179
>
> See how that is not going to work. ;-)

So exactly what did you try?
>
>>> http://bubba.org/wiki/index.php/SSH_Log_Action_Script
>>> This is written in perl, but it should work. At least partly.
>>
>> There are risks with log readers like blockhosts:
>> http://www.ossec.net/main/attacking-log-analysis-tools
>
> Sure there is. However the sample given will not cause a real issue:
> Apr 18 21:28:40 penne sshd[32018]: \
> Invalid user myfakeuser from 10.1.1.1 port 123 ssh2 from 127.0.0.1
>
> So if you look at only the IP adress after the from, then you have an
> issue. If you look at the last item, then there is no issue.
>
> I also tried the blockhosts one and I did not get the expected behaviour
> as the latest version already has the patch worked in. They talk about
> 2.0.3 I have version 2.4
>
> So at least with BlockHosts the URL is out of date. From the examples
> that page is from 2007.

OK.

>> Since strong passwords is my mantra I haven't installed blockhosts on
>> main machine anyway. (or did I forget, gee... lemme think...)
>
> Strong passwords is about security. BlockHosts is not about security.
> Also I was not talking about whatever blockhosts does, but about
> contacting the people to do something about it.

That's what I meant with expandind from what it does now to also send
mail.
>
>>>What are you going to do with an adress like
>>> a88-112-24-179.elisa-laajakaista.fi?
>>
>> You can easily get the IP from it I guess. It's in it. Well hidden :)
>> That's a virtual machine. With blockhosts.
>
> Yeah, but what if I send an email to the provider and that provider
> automagically blocks that IP? That is why I think automatic blocking is
> a bad thing.

I wasn't talking about that. I meant:
Automatic blocking _in my machine_ like blockhosts does: yes.
Automatic email to ISP with a log attached: yes

What they do is up to them.

>>> Although that might not be very usefull. Looking at my own domain and my
>>> own IP, I would never get the email myself.
>>
>> I guess it's the ISP that is supposed to get the mail.
>
> Well, yes and no. There are several options:
> 1) You mail the user of the IP adress and let them solve the mistake
> themselves

Where do you send mail if you only have an IP, no email address?

> 2) Mail the provider and let them handle everything

I did that.

> 3) Send them both an email

See 1.
>
> The reson I am hesitand is because there are many providers out there
> who themselves have absolutely no clue as to what they are doing. There
> are disadvantages with all of them.
> The IP adress user ignoring you is an obvious one. However mailing the
> provider might result in several things.
> 1) The customer gets cut off without warning. I believe education is
> better then punishment.
> 2) They cut of the wrong user, because they do not understand what UTC
> stands for.
> 3) Nothing happens, while the IP user would gladly be helping
>
>> I've heard of honeypots and tarpits as well.
>> Somehow the latter sounds more fun, haven't looked into them though :)
>
> The latter is just slowing down everything. Basically used in SMTP. It
> occupies the attacking server.
>
So it seems, I googled.
--
http://waxborg.servepics.com
openSUSE 11.3 Milestone 5 (x86_64) 2.6.34-rc3-3-default
05:56am up 1 day 10:38, 6 users, load average: 0.25, 0.13, 0.04
From: Vahis on
On 2010-04-19, houghi <houghi(a)houghi.org.invalid> wrote:
> Vahis wrote:
>> I meant that the script would block the address in my machine like
>> blockhosts does and then send mail to the provider of that IP.
>
> OK. Then I misunderstood. I was not talking about BlockHosts anymore.
>
>>> Strong passwords is about security. BlockHosts is not about security.
>>> Also I was not talking about whatever blockhosts does, but about
>>> contacting the people to do something about it.
>>
>> That's what I meant with expandind from what it does now to also send
>> mail.
>
> I would be against it with how BlockHost works. But by all means, addapt
> it and also cotact the maker and see what he has to say about it.

As a non-skilled user I'd think of a script that first would grep the
addresses:

devlab:~ # grep 'Invalid user' /var/log/messages |awk
'{ip_array[$10]++;} END{for(ip_address in ip_array){print "FROM
",ip_address," there has been",ip_array[ip_address],"attempts"}}'

I could see maybe:
FROM 80.246.114.198 there has been 1828 attempts
FROM 79.188.159.100 there has been 1587 attempts

Then finding their ISP's abuse mail addresses by maybe whois.

Then sending them mail like:

FYI:
FROM 80.246.114.198 there have been 1828 attempts to crack my server
which has IP address 88.112.24.179.


Vahis
--
http://waxborg.servepics.com
openSUSE 11.3 Milestone 5 (x86_64) 2.6.34-rc3-3-default
09:16am up 1 day 13:58, 6 users, load average: 0.00, 0.02, 0.00
From: Vahis on
On 2010-04-20, Moe Trin <ibuprofin(a)painkiller.example.tld.invalid> wrote:
> On Mon, 19 Apr 2010, in the Usenet newsgroup alt.os.linux.suse, in article
><20100419091656(a)usenet.waxborg.local>, Vahis wrote:
>
>>As a non-skilled user I'd think of a script that first would grep the
>>addresses:
>
>>devlab:~ # grep 'Invalid user' /var/log/messages |awk
>>'{ip_array[$10]++;} END{for(ip_address in ip_array){print "FROM
>>",ip_address," there has been",ip_array[ip_address],"attempts"}}'
>
>>I could see maybe:
>
>>FROM 80.246.114.198 there has been 1828 attempts
>>FROM 79.188.159.100 there has been 1587 attempts
>
> 'bots. The second one is tpnet.pl who is notorious for ignoring abuse
> complaints. They're almost as useless as verizon.net or swbell.

>
> you won't find as much traffic as there used to be ~5 years ago. Most
> abuse-desk positions have been eliminated by the bean counters as
> non-profitable. Sad, but true.

I got an awesome result by running this:

zgrep "Invalid user" /var/log/messages* | awk '{print $8}' | sort | uniq
-c | sort -nr | less

It's amazing.
Especially the number of Finnish first names and even a few Finnish
family names quite a number of times were stunning.

The top 5 is quite predictable though:
444 test
398 oracle
284 nagios
214 user
200 guest

Vahis
--
http://waxborg.servepics.com
openSUSE 11.3 Milestone 5 (x86_64) 2.6.34-rc3-3-default
21:27pm up 3 days 2:09, 11 users, load average: 0.09, 0.09, 0.02
From: Vahis on
On 2010-04-19, houghi <houghi(a)houghi.org.invalid> wrote:
> Vahis wrote:
>> As a non-skilled user I'd think of a script that first would grep the
>> addresses:
>>
>> devlab:~ # grep 'Invalid user' /var/log/messages |awk
>> '{ip_array[$10]++;} END{for(ip_address in ip_array){print "FROM
>> ",ip_address," there has been",ip_array[ip_address],"attempts"}}'
>
> The ip_array[$10]++; makes it vurlnerable to the false logfile stuff you
> warned me for earlier. ;-)

I'm not going to try to do anything, anyway.
Too much work for nothing.

<snip>
> I would even add the lines from the logfile (perhaps as an attachment),
> and I see that as a usefull thing.

I did exactly that some time ago. Manually.
I probably won't bother anymore.

<snip>
>
> So now those will be blocked as well. At least that is what I hope. Will
> see what happens in a few days.

I will just let them try. I'm sure there will be no harm, sshd is secure
AFAIK.

I'm running blockhosts on this virtual machine and current

#---- BlockHosts Additions
ALL: 212.14.228.46 : deny
ALL: 61.151.246.140 : deny
ALL: 59.39.66.30 : deny
ALL: 61.233.76.135 : deny
ALL: 68.71.49.2 : deny
#---- BlockHosts Additions

have only those at the moment.

My main machine is at a non-standard port and nobody has tried anything
in maybe a year.

Vahis
--
http://waxborg.servepics.com
openSUSE 11.3 Milestone 5 (x86_64) 2.6.34-rc3-3-default
20:26pm up 2 days 1:08, 8 users, load average: 0.07, 0.03, 0.01
From: Moe Trin on
On Mon, 19 Apr 2010, in the Usenet newsgroup alt.os.linux.suse, in article
<20100419091656(a)usenet.waxborg.local>, Vahis wrote:

>As a non-skilled user I'd think of a script that first would grep the
>addresses:

>devlab:~ # grep 'Invalid user' /var/log/messages |awk
>'{ip_array[$10]++;} END{for(ip_address in ip_array){print "FROM
>",ip_address," there has been",ip_array[ip_address],"attempts"}}'

>I could see maybe:

>FROM 80.246.114.198 there has been 1828 attempts
>FROM 79.188.159.100 there has been 1587 attempts

'bots. The second one is tpnet.pl who is notorious for ignoring abuse
complaints. They're almost as useless as verizon.net or swbell.

>Then finding their ISP's abuse mail addresses by maybe whois.

There _used_to_be_ a 'whois.abuse.net' that listed abuse@ addresses
for many domains. I don't know how well it works any more.

>Then sending them mail like:
>
>FYI:
>FROM 80.246.114.198 there have been 1828 attempts to crack my server
>which has IP address 88.112.24.179.

If you are lucky, you may get a response from an ignore-bot server at
the ISP, and little else. If you look in the Usenet newsgroups in the
'news.admin.net-abuse.* newsgroups

[compton ~]$ zgrep net-abuse big.8.list.04.15.10.gz
news.admin.net-abuse.blocklisting Discussion of ip-based blocklisting.
(Moderated)
news.admin.net-abuse.bulletins Bulletins of action about net abuse. (Moderated)
news.admin.net-abuse.email Discussion of abuse of email systems.
news.admin.net-abuse.misc Network facility abuse, including spamming.
news.admin.net-abuse.policy Discussion of net abuse policy. (Moderated)
news.admin.net-abuse.sightings Sightings of net abuse. (Moderated)
news.admin.net-abuse.usenet Discussion of abuse of the Usenet system.
[compton ~]$

you won't find as much traffic as there used to be ~5 years ago. Most
abuse-desk positions have been eliminated by the bean counters as
non-profitable. Sad, but true.

Old guy