Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
 Post subject: Outbound UDP DOS on VPS
PostPosted: Tue Feb 14, 2012 4:24 am 
Offline
Senior Newbie

Joined: Mon Jan 10, 2011 3:22 am
Posts: 5
Website: http://www.PankajBatra.com
Yahoo Messenger: batra.pankaj
Location: Gurgaon, India
Recently I encountered an outbound DOS kind of attack on my linode (running few wordpress blogs and a OSQA wesbite on apache+mysql), where UDP packets were being transferred at a pretty fast rate.

It consumed 50-60 Gigs of bandwidth within one hour.

Linode has raised security alert and asked me to do system migration in case it was a compromise.

I have checked system for most intrusion signs but did not find any evidence.

- scanned with Chkrootkit and Rkhunter. There was no exploits found on server.
- iptables have been configured to block all ports except sshd and 80.
- SSH has been locked down and login is only through SSH keys.
- RootLogin is disabled with SSH.
- Checked /var/log/auth.log and lastlog for brute force attempts
- checked files in /tmp directory.
- Check running processes for any suspect.

I saw data being communicated with an IP 209.3.33.161, so added this IP to hosts.deny file to be on safe side.

I suspect that it might be a web script/wordpress plugin. I am still searching for it.

I already have other linode ready to move files onto that. But if there is a file in websites, it may also be copied there and this issue may arise in other linode as well. So I want to be fully sure before copying files to new linode.

Can somebody help in identifying the culprit here?

And as I have little experience with managing server, linode being unmanaged service, should I switch to any managed VPS who can help identify this kind of issues and resolve them.

If yes, can community suggest some good managed VPS under 40$ per month.

_________________
- Pankaj Batra
http://www.PankajBatra.com


Top
   
 Post subject:
PostPosted: Tue Feb 14, 2012 1:04 pm 
Offline
Junior Member
User avatar

Joined: Wed Nov 16, 2011 11:41 am
Posts: 37
Website: http://empoweringmedia.com
Location: United States
Was the kernel used an old one? Granted UDP packets can be spoofed, but more than likely it came from your instance since it was recorded on the host from their graphs. I would just create a new instance. Make sure your site apps are current and not hacked. Make sure the servies have the latest version based upon your distro.

To answer your second question, you might be able to find a managed provider for $40/mo, but not Xen based like Linode is. To get that price point it must be Virtuozzo based and oversell the host. IMHO should should at least add $100 to that price point to get a fully managed Xen based solution.

_________________
Larry Ludwig
Empowering Media
Managed Cloud Services and Managed VPS


Top
   
 Post subject: resolved
PostPosted: Tue Feb 14, 2012 1:08 pm 
Offline
Senior Newbie

Joined: Mon Jan 10, 2011 3:22 am
Posts: 5
Website: http://www.PankajBatra.com
Yahoo Messenger: batra.pankaj
Location: Gurgaon, India
It was timthumb.php vulnerability. Read more for explanation: http://www.webrevised.com/130-timthumb- ... -affected/

This was the script which was uploaded to server due to timthumb.php vulnerability: http://pastebin.com/nVeVMgL4
And it was placed cache directory and executed by attacker whenever he wanted a UDP DOS attack.

_________________
- Pankaj Batra

http://www.PankajBatra.com


Top
   
 Post subject: Re: resolved
PostPosted: Tue Feb 14, 2012 5:27 pm 
Offline
Senior Member
User avatar

Joined: Wed Mar 17, 2004 4:11 pm
Posts: 554
Website: http://www.unixtastic.com
Location: Europe
pankajbatra wrote:
It was timthumb.php vulnerability. Read more for explanation: http://www.webrevised.com/130-timthumb- ... -affected/


Ouch! That is some nasty vulnerability.


Top
   
 Post subject:
PostPosted: Tue Feb 14, 2012 5:43 pm 
Offline
Senior Member
User avatar

Joined: Wed Apr 20, 2011 1:09 pm
Posts: 63
@pankajbatra - for what it's worth, do you have any entries in your access logs with the useragent "Mozilla/4.0 (compatible; MSIE 5.23; Mac_PowerPC)" ? I've got some logs of this attack being attempted before, and that UA being used by the script used to try to inject it in.


I'm curious as to whether the same UA was used when it was injected onto your own system.

_________________
うるさいうるさいうるさい!


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group