Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
 Post subject: Break-In Attempts
PostPosted: Fri May 27, 2011 12:49 pm 
Offline
Senior Newbie

Joined: Fri May 27, 2011 11:48 am
Posts: 8
I am a recent customer to linode.

I have a fairly constant stream of attempted break-ins to my machine. As examples 212.190.88.175/dmz2-ip175.elex.be has made several attempts via SSH to access accounts named root, admin, mysql. 61.163.4.102/hn.ly.kd.adsl is attempting to access the tomcat manager.

I have taken reasonable attempts to prevent break-ins so my question isn't about that. Mysql, tomcat are not install on the box. "admin" account does not exist, "root" account cannot be accessed via SSH.

Rather, what can I do to inform the network operators / authorities about attempts to break into my machine?


Top
   
 Post subject:
PostPosted: Fri May 27, 2011 12:53 pm 
Offline
Junior Member

Joined: Thu Nov 25, 2010 7:41 pm
Posts: 27
Thousands of these 'break-in attempts' are sent automatically from (probably) stolen servers every day. I get tons of these, all of which are useless if you use public-key authentication.

tl;dr: There is no point in reporting them, and you should use public key authentication.


Top
   
 Post subject:
PostPosted: Fri May 27, 2011 12:54 pm 
Offline
Senior Member
User avatar

Joined: Wed Apr 20, 2011 1:09 pm
Posts: 63
This will happen to you daily from numerous IP addresses.

You're not going to be able to keep up with the number of abuse reports you'll have to send out.


There is something worth taking a look at though to cut the attacking IP addresses off after so many tries: http://library.linode.com/security/basi ... rd-attacks

I recommend denyhosts, personally.


Top
   
 Post subject:
PostPosted: Fri May 27, 2011 1:03 pm 
Offline
Senior Member

Joined: Sun Mar 07, 2010 7:47 pm
Posts: 1970
Website: http://www.rwky.net
Location: Earth
You can report them to the abuse email for the ip, in this case abuse@be.uu.net you can get that by doing whois ipaddress

However in all my years as an admin I've only ever had one response to an abuse email I've sent.

_________________
Paid support
How to ask for help
1. Give details of your problem
2. Post any errors
3. Post relevant logs.
4. Don't hide details i.e. your domain, it just makes things harder
5. Be polite or you'll be eaten by a grue


Top
   
 Post subject:
PostPosted: Fri May 27, 2011 1:16 pm 
Offline
Senior Newbie

Joined: Fri May 27, 2011 11:48 am
Posts: 8
Is there a general way to identify the owner of an IP address? Some domains are kindof bogus like hn.ly.kd.adsl.

I'm thinking of something like looking up though BGB or IANA or something about who has the block of IP's.


Top
   
 Post subject:
PostPosted: Fri May 27, 2011 1:59 pm 
Offline
Senior Member
User avatar

Joined: Tue May 26, 2009 3:29 pm
Posts: 1691
Location: Montreal, QC
Generally, the procedure is:

1) Look up the IP on http://www.iana.org/cgi-bin/whois to find out what RIR manages the IP
2) Look up the IP on the RIR's WHOIS page (IANA's whois gives you the address)

As an example, let me look up the IP of my linode, 97.107.142.x.

First, I enter the IP on the IANA whois. This tells me it's administered by ARIN, and that the whois for ARIN is http://whois.arin.net.

Next, I enter the IP on http://whois.arin.net, which tells me lots of info about this IP, such as that it's owned by Linode, the address and telephone number of Linode, their designated abuse contact, etc.


Top
   
 Post subject:
PostPosted: Fri May 27, 2011 1:59 pm 
Offline
Senior Member
User avatar

Joined: Sun Dec 27, 2009 11:12 pm
Posts: 1038
Location: Colorado, USA
I'd find a new hobby - tracking down bots on the internet has a zero ROI (both in fun or profit).

Besides, if you don't take even the most minor of steps to secure your box so that you don't get hacked by script kiddies, most people (including myself) will have zero sympathy for you.


Top
   
 Post subject:
PostPosted: Fri May 27, 2011 3:06 pm 
Offline
Senior Member
User avatar

Joined: Sat Aug 30, 2008 1:55 pm
Posts: 1739
Location: Rochester, New York
For looking up who is responsible for an IP, revip.info is a pretty good reference, too.

_________________
Code:
/* TODO: need to add signature to posts */


Top
   
 Post subject:
PostPosted: Sat May 28, 2011 8:38 pm 
Offline
Senior Member

Joined: Wed Mar 03, 2010 2:04 pm
Posts: 111
As others have stated...you just have to learn to ignore these things. Complete. Waste. Of. Time. (I do want to know what the one response to obs was, though!)

I will make the suggestion that you move SSH to a different port. It reduces the attempted logins from bots by a massive amount (essentially zero). It's like hiding your front door on the side of your house. You're still responsible for locking it, but at least it's not immediately evident from the street. Anyone else caught portscanning will be blocked by your CSF/LFD installation. And of course with LFD or fail2ban you're more protected from failed logins. To say nothing of using keys rather than passwords for SSH logins, which was noted by GLaDOSDan.


Top
   
 Post subject:
PostPosted: Sat May 28, 2011 10:21 pm 
Offline
Senior Newbie

Joined: Fri May 27, 2011 11:48 am
Posts: 8
Thank you, I had already secured the box. How to secure the box wasn't really my question. In any case if I hadn't my machine would have been compromised days ago. I have had 2800 attempted logins in the last week. 2300 today :).

I really don't like it that someone can constantly attempt to break into other machines and nobody will do anything about it. Though I imagine Jurisdiction and Language put up some pretty big barriers. Most of the attacks so far have come from Russia (surprise :) ), China (surprise :) ), Vietman and Indonesia. Even if the operator was willing to do something I doubt we would be able to communicate.

I'm hoping for a bit of luck with the 2300 attempts today. They almost all came from a site in Montreal, and maybe I will have a bit of luck as I also Hail from Canada.

PS: I have found just invoking "whois [ip]" from Linux gives the best answers on who is responsible. Most operators will an abuse email address.


Top
   
 Post subject:
PostPosted: Sat May 28, 2011 10:26 pm 
Offline
Senior Newbie

Joined: Fri May 27, 2011 11:48 am
Posts: 8
Now I assume it is NOT futile to contact Linode about abuse ...

They have abuse contacts ...

RAbuseHandle: LAS12-ARIN
RAbuseName: Linode Abuse Support
RAbusePhone: +1-609-593-7103
RAbuseEmail: abuse@linode.com
RAbuseRef: http://whois.arin.net/rest/poc/LAS12-ARIN


Top
   
 Post subject:
PostPosted: Sat May 28, 2011 10:35 pm 
Offline
Senior Member
User avatar

Joined: Sun Dec 27, 2009 11:12 pm
Posts: 1038
Location: Colorado, USA
You should get a mask and a cape - then you could be the superhero fighting botnets on the wild wild Internet.

Never fear!!!!!!! Bitboy is here!!!!!!!

Whooooosh, Zap!, Bammo!


Top
   
 Post subject:
PostPosted: Sun May 29, 2011 12:58 am 
Offline
Senior Member

Joined: Wed Mar 03, 2010 2:04 pm
Posts: 111
mikefletcher wrote:
Thank you, I had already secured the box. How to secure the box wasn't really my question. In any case if I hadn't my machine would have been compromised days ago. I have had 2800 attempted logins in the last week. 2300 today :).


Well, to be fair, if you took my advice and changed the port that number would be zero. Just sayin'. I know it wasn't your question, but I considered it helpful advice, since I don't consider reporting eastern european script kiddies to be of any particular use. I suspect you will eventually be frustrated by a lack of interest on the part of people who don't care about what goes on in their own networks, let alone yours.


Top
   
 Post subject:
PostPosted: Sun May 29, 2011 3:27 am 
Offline
Senior Newbie

Joined: Sat May 28, 2011 4:37 am
Posts: 12
haus wrote:
Well, to be fair, if you took my advice and changed the port that number would be zero.


I've changed my SSH port number to 1402 and still have 10-20 break-in attempts per hour. No idea how they found out which port it is.

These break-in attempts are pretty useless because I only use public-key authentication. Still annoying, though.


Top
   
 Post subject:
PostPosted: Sun May 29, 2011 3:49 am 
Offline
Senior Member

Joined: Sat Nov 13, 2010 3:05 am
Posts: 91
Website: http://www.graq.co.uk
vonskippy wrote:
You should get a mask and a cape - then you could be the superhero fighting botnets on the wild wild Internet.

Never fear!!!!!!! Bitboy is here!!!!!!!

Whooooosh, Zap!, Bammo!
Holy address lookup! Is that IPv6, Bitboy??


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group