[lug] TCP Wrapers and Going After Bad People

Walter Pienciak walter at frii.com
Wed Sep 12 12:14:54 MDT 2001


On Wed, 12 Sep 2001, Greg Horne wrote:

> Yo BLUG, yes. . . You CAN help Greg get the bad guys!
>
> So two people stand out in my logs as always trying to break into my
> systems.  I get e-mails daily from the servers saying . . .Tried NS1, tried
> MMS1, tried Webserver 1, etc. . .
>
> My question is this:  Have any of you tried to track some of these people
> down?  Any sucess stories to tell?  If so, what were your methods?
>
> For good measure i'll include the *evil* offenders.
>
> attempt from APoitiers-103-1-1-165.abo.wanadoo.fr unknown 193.253.254.165
> to in.ftpd at Wed Sep 12 05:30:51 PDT 2001
>
> attempt from HSE-QuebecCity-ppp3496564.sympatico.ca unknown 65.92.224.5 to
> in.ftpd at Tue Sep 11 18:57:37 PDT 2001
>
> Thanks,
>
> Greg Horne

Hi, Greg.

1)  Many security people are going to yawn if you present occasional
    attempts at FTP access as hacking that demands their attention.
    I assume there's more:  i.e., attempts on many services, so that
    the logs show a clear pattern of repeated attempts on ports they
    have no business attempting to access.

That said, you proceed by

a)  Make DAMNED sure you have NTP running on your hosts.  These connection
    attempts may be from dial-up/part-time connections, or hosts with
    multiple users, and unless your log's timestamps can be correlated
    EXACTLY to their ISP's records, you are out of luck.  So make sure
    NTP is running and synchronizing correctly NOW, and don't waste
    yuor time pursuing this until/unless they hit you again, at which point
    you'll have synchronized logs files.

b)  Do your research as to the correct contacts within the offending
    ISPs.  Look on their main website for security or abuse e-mail
    aliases.  If that fails, look to their DNS SOA records for
    a valid administrative alias within the domain.  They may deal with
    your request, forward it on correctly or incorrectly, or ignore it.
    Here's how you get an SOA record:

    thunderdome [20]% nslookup
    > set type=SOA
    > sympatico.ca
    Server:         216.17.128.1
    Address:        216.17.128.1#53

    sympatico.ca
        origin = dns1.sympatico.ca
        mail addr = dns-admin.sympatico.ca
        serial = 400109041
        refresh = 10800
        retry = 3600
        expire = 604800
        minimum = 1200
    > ^D

    That line that reads 'mail addr = dns-admin.sympatico.ca' ?
    Change the first . to an @:  dns-admin at sympatico.ca

c)  Notify the ISP, and include relevant log data.

d)  Don't expect a response, but move on.  Make sure your system
    is as secure as you can make it, because responding to attempted
    accesses is like playing Whack-a-Mole.

Walter





More information about the LUG mailing list