chyba mam mały włam :-)

havner havner w smtp.kamp.pl
Czw, 21 Paź 2004, 23:47:24 CEST


On Thu, Oct 21, 2004 at 11:00:22PM +0200, marcin steć wrote:
> W /var/log/secure właśnie znalazłem toto:
> 
> Oct 21 22:36:32 vanish sshd[3532]: Illegal user rolo from 
> ::ffff:65.198.47.75
> Oct 21 22:36:32 vanish sshd[3532]: input_userauth_request: illegal user rolo
> Oct 21 22:36:37 vanish sshd[3532]: Address 65.198.47.75 maps to 
> host75.ironhide.
> com, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
> Oct 21 22:36:37 vanish sshd[3532]: error: Could not get shadow 
> information for N
> OUSER
> Oct 21 22:36:37 vanish sshd[3532]: Failed password for illegal user rolo 
> from ::
> ffff:65.198.47.75 port 44814 ssh2
> Oct 21 22:36:37 vanish sshd[3532]: Received disconnect from 
> ::ffff:65.198.47.75:
> 11: Bye Bye
> Oct 21 22:36:39 vanish sshd[3533]: Illegal user iceuser from 
> ::ffff:65.198.47.75
> Oct 21 22:36:39 vanish sshd[3533]: input_userauth_request: illegal user 
> iceuser
> Oct 21 22:36:39 vanish sshd[3533]: Address 65.198.47.75 maps to 
> host75.ironhide.
> com, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
> Oct 21 22:36:39 vanish sshd[3533]: error: Could not get shadow 
> information for N
> OUSER
> 
> Kurtuazyjnie puściłem namapa pod ten adres, ale nie wyszło nic ciekawego:
> Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2004-10-21 22:48 
> CEST
> Warning:  OS detection will be MUCH less reliable because we did not 
> find at least 1 open and 1 closed TCP port
> Interesting ports on host75.ironhide.com (65.198.47.75):
> (The 1662 ports scanned but not shown below are in state: filtered)
> PORT   STATE SERVICE
> 22/tcp open  ssh
> Device type: broadband router|router|general purpose
> Running: Conexant embedded, Draytek embedded, FreeSCO Linux 2.0.X, Linux 
                                                    ^^^

I wszystko jasne ;-)

> 2.4.X|2.5.X, Siemens embedded
> Too many fingerprints match this host to give specific OS details
> Uptime 62.033 days (since Fri Aug 20 22:04:43 2004)
> 
> Nmap run completed -- 1 IP address (1 host up) scanned in 224.000 seconds
> 
> 
> Tak sobie się zastanawiam jaki byłby zestaw regułek iptables, żęby się 
> natręta pozbyć...
> W zasadzi z zewnątrz to mam potrzebę wjechać wyłącznie po ssh. Porblem w 
> tym, że mam
> jedną kartę, i na niej ip dynamiczne z kablówki i statyczne do 
> rozmawiania z kilkoma vmwarami. Maszyna robi też z gateway dla tychże 
> vmów. Dotychczasowe regułki to:
> 
> [root w vanish /root]# 
> iptables-save                                            
> # Generated by iptables-save v1.2.11 on Thu Oct 21 22:58:58 2004
> *nat
> :PREROUTING ACCEPT [15447:811805]
> :POSTROUTING ACCEPT [30923:1588841]
> :OUTPUT ACCEPT [30939:1592202]
> -A POSTROUTING -s 172.16.80.0/255.255.240.0 -j MASQUERADE
> COMMIT
> # Completed on Thu Oct 21 22:58:58 2004
> # Generated by iptables-save v1.2.11 on Thu Oct 21 22:58:58 2004
> *filter
> :INPUT ACCEPT [103728:43556812]
> :FORWARD DROP [0:0]
> :OUTPUT ACCEPT [141277:93871525]
> -A FORWARD -s 172.16.80.0/255.255.240.0 -j ACCEPT
> -A FORWARD -d 172.16.80.0/255.255.240.0 -j ACCEPT
> COMMIT
> # Completed on Thu Oct 21 22:58:58 2004

Przeciez te regulki nie robia nic poza maskarada, nie ma tu zadnych
zabezpieczen. A te linijki z acceptem na forwarda sa niepotrzebne bo nie
blokujac go forward jest domyslnie odblokowany.

-- 
Regards    Havner                      {jid,mail}:havner(at)pld-linux.org
PLD developer && PLD 2.0 release manager         http://www.pld-linux.org
PLD LiveCD author                             http://livecd.pld-linux.org
                   "Quis custodiet ipsos custodes?"




Więcej informacji o liście dyskusyjnej pld-users-pl