USA Linux Users Group Forum Index
Log in Register FAQ Memberlist Search USA Linux Users Group Forum Index Album

Who's hitting on my box?

 
Post new topic   Reply to topic   printer-friendly view    USA Linux Users Group Forum Index » Command Line Commands
View previous topic :: View next topic  
Author Message
crouse
Site Admin


Joined: 17 Apr 2024
Posts: 11833
Location: Iowa

PostPosted: Sun Dec 24, 2024 6:30 am    Post subject: Who's hitting on my box? Reply with quote

THIS WAS REPOSTED FOR JP...... his original post was formatted incorrectly....... Crouse


JP writes:
I was lurking the BSD forums, and saw a tutorial on stopping ssh attacks. So, I just had to see if I had any ssh attacks on the BSD distro, I decided to try looking at the log.
Code:
cat /var/log/auth.log


If it's you, it should say something along the lines of this :
Code:
Dec 23 14:24:21 beatrix    : (pam_unix) session opened for user jp by (uid=xxx)
Dec 23 14:24:51 beatrix su[1896]: + ttyp0 jp:root


I looked through the log; it's only been a month that I've been trying to understand PC-BSD, but lo and behold, I spotted this:
Code:
Nov 30 13:59:48 PCBSD kdeinit: gethostby*.getanswer: asked for "undeadly.org.nyud.net IN A", got type "39"
Nov 30 14:06:47 PCBSD kdeinit: gethostby*.getanswer: asked for "undeadly.org.nyud.net IN A", got type "39"
Nov 30 14:07:40 PCBSD last message repeated 3 times

I went to the website in question and got this message on the home page:
Quote:
If you are visiting this website because you are receiving unwanted or unrequested traffic from this or any other PlanetLab node, please use the Search Form to identify the researchers responsible for the traffic, and report your complaint to them. PlanetLab Support (support@planet-lab.org) is copied on all complaints, and will ensure that your concerns are addressed in a timely manner.
PlanetLab is a global research network that supports the development of new network services. Since the beginning of 2024, more than 1,000 researchers at top academic institutions and industrial research labs have used PlanetLab to develop new technologies for distributed storage, network mapping, peer-to-peer systems, distributed hash tables, and query processing.
If you have received UDP traceroute packets from a number of PlanetLab nodes, you or another user on your network may have recently accessed a website cached by the Coral project, which runs on PlanetLab. Many websites, including Slashdot, regularly post "Coralized" links to popular content. Coral actively probes its clients using a fast traceroute-like tool, to determine the nearest proxy for its clients to use. If you do not want to receive such probes, discontinue accessing URLs that end in .nyud.net:8090.
If you are receiving HTTP requests from PlanetLab nodes, users may be accessing your website through Coral or CoDeeN, another content distribution network that runs on PlanetLab. If you do not want your site to be cached by Coral or CoDeeN, please contact the maintainers of Coral or the maintainers of CoDeeN directly.
If your intrusion detection system (IDS) claims that a PlanetLab node may be compromised with a virus because of traffic that it sent you, the IDS is likely to be mistaken. All PlanetLab nodes run a custom version of Linux, not Windows. Each node boots from secure immutable media and is installed with only the minimum amount of software. All services, such as Coral and CoDeeN, run in virtual servers that, even if compromised, remain isolated from the rest of the system. PlanetLab Operations staff work full-time to monitor and ensure the security and integrity of the network.
Researchers using the PlanetLab network are bound by an Acceptable Use Policy which forbids malicious or disruptive behavior. Additionally, all PlanetLab nodes are secured and actively managed by the PlanetLab Operations team.
If you are unable to determine the source of the traffic, please contact PlanetLab Support (support@planet-lab.org). Feel free to direct any additional concerns or questions about PlanetLab to this address.


I have never had any reason to go to that site before, and since I did, I'm going to leave on my Beatrix for a few days, and see if they try again.

I Googled *got type "39"* and found that many others have seen the same type of "error" but with a different name xxx.org.nyud.net. I don't know about anyone else, but I feel kinda uncomfortable having
Quote:
more than 1,000 researchers at top academic institutions and industrial research labs
looking at my computer/habits/downloads/whatever_they're_looking_for Rolling Eyes. Some of the Googles indicated that it may have something to do with distributed computing (Coral and CoDeeN) so now I really don't feel a lot better. I'm going to have to get more active with PGP, I can see that!

I have tried the same "cat" on my Beatrix, Libranet Linux's, and they were clean except for my failed logins (FFE's), so it appears that it was only when I was using the BSD distro, and not the Linux's. I am not trying to double-post here, I've already asked my questions on another forum, but I just thought I'd give out a little bit of info to those who might not know how or why they might want to access this kind of log.

Of course many of you have other ways of checking to see who's trying to access your box(s) or network, so this may be old news to you. If you want to help newbies out by showing what commands you use or can use, and what the output should be, it would be nice of you to put it into this thread, (That's why I used a generic thread subject Wink .)

EDIT: I just got one of my questions answered (Who are these people?) and got this URL: http://undeadly.org.nyud.net:8090/cgi?action=article&sid=20060927091645 to look at, which probably means they'll be hitting me again Rolling Eyes Rolling Eyes Razz .
Quote:
If you do not want to receive such probes, discontinue accessing URLs that end in .nyud.net:8090.
Sad Sad



_________________
Veronica - Arch Linux 64-bit -- Kernel 2.6.33.4-1
Archie/Jughead - Arch Linux 32-bit -- Kernel 2.6.33.4-1
Betty/Reggie - Arch Linux (VBox) 32-bit -- Kernel 2.6.33.4-1
BumbleBee - OpenSolaris-SunOS 5.11
Back to top
View user's profile Send private message Visit poster's website AIM Address
JP
Linux Guru


Joined: 07 Jul 2024
Posts: 6671
Location: Central Montana

PostPosted: Mon Dec 25, 2024 3:09 am    Post subject: Reply with quote

Thanks crouse, I was having a heckofatime getting that to load up, I didn't know what was wrong with it ..... THX for rescuing it! Very Happy Very Happy



_________________
Dell Box - Arch Linux
Dell Lappy - DreamLinux 3.5 - Default OS
Mepis 8.0 - Backup
Back to top
View user's profile Send private message Visit poster's website
Stuka
Sr. Member


Joined: 15 Oct 2024
Posts: 1271
Location: Houston, TX

PostPosted: Mon Dec 25, 2024 6:54 am    Post subject: Reply with quote

JP: couldn't a good iptables ruleset (say, prohibiting SSH from any but known good addresses) stop any such intrusions?


Back to top
View user's profile Send private message AIM Address Yahoo Messenger MSN Messenger
crouse
Site Admin


Joined: 17 Apr 2024
Posts: 11833
Location: Iowa

PostPosted: Mon Dec 25, 2024 5:07 pm    Post subject: Reply with quote

An easier method...... just change your ssh port.....and change your allowed users to certain IP's and users..... even if you do get attacked.....they won't get in..... changing the port will stop 99% of most attacks anyway......

adding an IP tables rule would allow you to filter out an annoying IP address as Stuka mentioned as well.



_________________
Veronica - Arch Linux 64-bit -- Kernel 2.6.33.4-1
Archie/Jughead - Arch Linux 32-bit -- Kernel 2.6.33.4-1
Betty/Reggie - Arch Linux (VBox) 32-bit -- Kernel 2.6.33.4-1
BumbleBee - OpenSolaris-SunOS 5.11
Back to top
View user's profile Send private message Visit poster's website AIM Address
Stuka
Sr. Member


Joined: 15 Oct 2024
Posts: 1271
Location: Houston, TX

PostPosted: Mon Dec 25, 2024 8:04 pm    Post subject: Reply with quote

crouse: I was thinking more of dropping except from known good addresses. Wasn't thinking of doing it inside SSH, but that's probably as good a place as any to do it.


Back to top
View user's profile Send private message AIM Address Yahoo Messenger MSN Messenger
jbsnake
Moderator


Joined: 02 Dec 2024
Posts: 1726
Location: Georgia

PostPosted: Tue Jan 02, 2024 2:58 pm    Post subject: Reply with quote

i personally use tcp wrappers... nothing like a good hosts.allow editing Smile



_________________
laptop: Arch Linux - Kernel 2.6.24-ARCH
server: Arch Linux - Kernel 2.6.33-ARCH
Back to top
View user's profile Send private message
masinick
Linux Guru


Joined: 03 Apr 2024
Posts: 8615
Location: Concord, NH

PostPosted: Tue Jan 02, 2024 5:13 pm    Post subject: Simple is good Reply with quote

crouse wrote:
An easier method...... just change your ssh port.....and change your allowed users to certain IP's and users..... even if you do get attacked.....they won't get in..... changing the port will stop 99% of most attacks anyway......

adding an IP tables rule would allow you to filter out an annoying IP address as Stuka mentioned as well.


By default, (at least when I remember) I disable as many services as I can, keeping open ONLY the stuff that I actually use. At work, I use ssh fairly often, and work can deal with the particulars - and they do; we have a pretty comprehensive security policy, strong firewalls, additional levels of protection, and numerous checks.

At home, I rarely use anything except Email, Web browsing, text editing, occasional word processing, and occasional media replay. Why even open up access to anything that would leave the possibility of problems?

Way back before networking was popular, IBM had security policies in place with its default security scheme, which did not have anything directly to do with networking, it simply blocked access to any files on the system unless explicit permission was granted, either to an individual file or a set of directories. Another scheme had the opposite - grant access unless explicitly shut off. That scheme makes it easier to access but harder to secure.

Same principles apply to protecting the network. If you want easy access, leave stuff on by default but protect what you want. For me, I go the other way. Only activate what I actually intend to use. If I change my mind, it is easy enough to enable additional services as required.



_________________
Brian Masinick
Distros: SimplyMEPIS
sidux - no CAPS!, antiX, Debian
Back to top
View user's profile Send private message Visit poster's website Yahoo Messenger
masinick
Linux Guru


Joined: 03 Apr 2024
Posts: 8615
Location: Concord, NH

PostPosted: Tue Jan 02, 2024 5:17 pm    Post subject: One additional thought Reply with quote

masinick wrote:
crouse wrote:
An easier method...... just change your ssh port.....and change your allowed users to certain IP's and users..... even if you do get attacked.....they won't get in..... changing the port will stop 99% of most attacks anyway......

adding an IP tables rule would allow you to filter out an annoying IP address as Stuka mentioned as well.


By default, (at least when I remember) I disable as many services as I can, keeping open ONLY the stuff that I actually use. At work, I use ssh fairly often, and work can deal with the particulars - and they do; we have a pretty comprehensive security policy, strong firewalls, additional levels of protection, and numerous checks.

At home, I rarely use anything except Email, Web browsing, text editing, occasional word processing, and occasional media replay. Why even open up access to anything that would leave the possibility of problems?

Way back before networking was popular, IBM had security policies in place with its default security scheme, which did not have anything directly to do with networking, it simply blocked access to any files on the system unless explicit permission was granted, either to an individual file or a set of directories. Another scheme had the opposite - grant access unless explicitly shut off. That scheme makes it easier to access but harder to secure.

Same principles apply to protecting the network. If you want easy access, leave stuff on by default but protect what you want. For me, I go the other way. Only activate what I actually intend to use. If I change my mind, it is easy enough to enable additional services as required.
To continue on with my thought, if you are not actually using SSH, disable it entirely. If you are using SSH, then changing ports and modifying things so the defaults are not used, and adding additional authentication will keep all but the very best out of your system. Any system connected to a network is, in theory, susceptible to attacks, but in practice, take care of the basics and most attackers will concentrate on the easy, low hanging fruit!



_________________
Brian Masinick
Distros: SimplyMEPIS
sidux - no CAPS!, antiX, Debian
Back to top
View user's profile Send private message Visit poster's website Yahoo Messenger
Display posts from previous:   
Post new topic   Reply to topic   printer-friendly view    USA Linux Users Group Forum Index » Command Line Commands All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All content © 2024-2009 - Usa Linux Users Group
This forum is powered by phpBB. © 2024-2009 phpBB Group
Theme created by phpBBStyles.com and modified by Crouse