netcurmudgeon (netcurmudgeon) wrote,
netcurmudgeon
netcurmudgeon

  • Mood:
  • Music:

Waiting for the crunch

Would it surprise you if I told you that my two web servers are under continuous attack? Some of you, probably. Some of you, probably not at all. Since they went on line in late January alpha and beta have been subject to round-the-clock probing from would-be attackers. No one has gotten through. Or, let me be precise no one has broken into these boxes in a way that I have detected. I spent some time and effort in building them to be secure.1 And, I spend a fair amount of time working with them and keeping an eye on them. Thus, I am reasonably confident in saying that no one has compromised them. Yet.

All of this probing is what Cheswick & Bellovin called knob-twisting. Back when they wrote the first edition of Firewalls and Internet Security2 attackers were humans trolling for easy targets. Today they're attack scripts executed by humans trolling for easy targets. They don't represent a concerted all-out attempt to crack the servers, but merely twisting the servers' electronic door knobs to see if any of them are unlocked.

In the month to now, alpha has gotten 33 bogus ftp connection attempts (mere noise) and 2,210 bogus ssh (secure shell) connection attempts. The footprints of an attack script (and the same attack script, executed from several different hosts) are clearly evident in the log. The script tries a litany of common names hoping to find one where the account actually exists on the machine and there is no password assigned.3 Beta has like numbers in its logs, and one of the external hosts I administer at work tells a similar tale as well.

Following the rule "if it isn't turned on, it can't be attacked," alpha and beta don't run any un-needed processes. That's why the attacks appear to concentrate on ssh; there isn't much else to attack. The scriptkiddies running the attacks are looking for an account with no password, not trying some complicated buffer overflow. So, there are no footprints showing attacks on sendmail, or bind. And, a quick look through the web server (Apache) logs shows only a couple of attempted attacks (aimed at Microsoft's IIS). All good news, for now.

The boxes have only been online for about six weeks -- I expect that more serious challenges to their security will be forthcoming. In a sense, it's only a matter of time. Time until some script kiddy comes along with an attack script that is looking for some vulnerability that alpha and beta have that I have not yet patched. Depending on how serious the vulnerability is, the consequences could range from defacement of the web sites hosted on those boxes, to their being owned by someone exploiting a serious breach. Till then, we watch, we patch, and we wait.




1 Building Bastion Hosts With HP-UX 11, even though it's for HP-UX, is an excellent resource for learning the methods and mindset required to construct an iron-clad server.

2 While the first edition is dated, it's freely available on-line and is still an excellent (and short) read on how firewalls work and how attacks are made over the 'net.

3 One recent attack run tried "jordan, michael, nicole, daniel, andrew, magic, lion, david, jason, carmen, justin, charlie, steven, brandon, brian, stephen, william, angel, emily, eric, joe, tom, billy, buddy, jeremy, vampire, betty, max, nicholas, robin, johnny, lucy, maria, rose, mail, god, barbara, larisa, jane..." It ran through ninety names in all over the course of four minutes and fifty one seconds.
Subscribe
  • Post a new comment

    Error

    default userpic

    Your reply will be screened

    Your IP address will be recorded 

    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.
  • 3 comments