Hey gang, We're seeing an incredible amount of port- and proxy-scans from 211.0.0.0/8, and 0 legitimate packets from the same range. I'm thinking about blocking the entire /8, as noone on our network needs any contact with Asia (I belive those addresses are all in Asia - correct me if I'm wrong). Has anyone here blocked 211.? Any unexpected results when doing so? Thanks, John
On Sat, 1 Nov 2003 John_York@Dell.com wrote:
We're seeing an incredible amount of port- and proxy-scans from 211.0.0.0/8, and 0 legitimate packets from the same range. I'm thinking about blocking the entire /8, as noone on our network needs any contact with Asia (I belive those addresses are all in Asia - correct me if I'm wrong). Has anyone here blocked 211.? Any unexpected results when doing so?
Unexpected? It depends on what you expect the results to be. I have acted as a diplomat de jure negotating resumption of traffic between people blocking these network ranges and organizations in Japan in the past. In addition to Japan, the 211 netblock is assigned to organizations in other Asia Pacific countries. Its your network (or maybe your employer's network) to do whatever you choose. You may want to consider blocking smaller ranges than the entire /8.
Sean Donelan writes on 11/1/2003 5:23 PM:
Its your network (or maybe your employer's network) to do whatever you choose. You may want to consider blocking smaller ranges than the entire /8.
Or go the opposite extreme and nullroute 0/0. Portscans on the internet are a fact of life - unpleasant, yes, but you can safely ignore them, and instead, concentrate on keeping your systems secured. -- srs (postmaster|suresh)@outblaze.com // gpg : EDEDEFB9 manager, outblaze.com security and antispam operations
suresh@outblaze.com (Suresh Ramasubramanian) writes:
Portscans on the internet are a fact of life - unpleasant, yes, but you can safely ignore them, and instead, concentrate on keeping your systems secured.
that is certainly what the malware authors and users hope that we'll all do, so listen up. just because many of the infected hosts won't be disinfected, don't assume that there's no value in tracking and reporting them, or that there's no reason to spend money listening to and acting on complains about them. the internet's immune system needs *more* resources, not fewer. -- Paul Vixie
There are however legitimate reasons for a portscan, responding to incoming abuse and attack being one of them, automatically searching for openrealys used to send you spam is another. Curtailing scanning shouldn't be a priority here, nailing packet kids, spammers etc should be. Sadly both of these groups don't seem to be going to jail in droves. On 02 Nov 2003 05:14:38 +0000 Paul Vixie <vixie@vix.com> wrote:
suresh@outblaze.com (Suresh Ramasubramanian) writes:
Portscans on the internet are a fact of life - unpleasant, yes, but you can safely ignore them, and instead, concentrate on keeping your systems secured.
that is certainly what the malware authors and users hope that we'll all do, so listen up. just because many of the infected hosts won't be disinfected, don't assume that there's no value in tracking and reporting them, or that there's no reason to spend money listening to and acting on complains about them. the internet's immune system needs *more* resources, not fewer. -- Paul Vixie
-- Andrew D Kirch | trelane@2mbit.com | Security Admin | Summit Open Source Development Group | www.sosdg.org
Andrew D Kirch wrote:
There are however legitimate reasons for a portscan, responding to incoming abuse and attack being one of them, automatically searching for openrealys used to send you spam is another.
And on that note I would like to inform all, the new SORBS scanning process is running, this involves scanning all ports of machines used to send spam or high spamassassin scoring mail. When scanning is complete it will test each port for various proxy and relay methods, identification rate varies, but I have found a large number of proxy servers recently (as many as 30 in any one minute) on unusual ports (similar to jeem, but appearing anywhere port 1 through 65535). If you see a scan, the SORBS scans are initiated with nmap and are not using any of the stealth options (deliberately), each host scanning has a PTR record indicating a sorbs.net host barring one - that one will answer on port 80 with the SORBS website. Scans are performed after a host sends spam or high scoring mail only, and should only be tested once in any 3 month period, unless spam is received in which case it may be tested manually as well. I'm sorry if that inconvinences users, and/or admins, however I believe it is for the greater good. As before anyone wanting network reports for the networks they are responsible for should send email to me (off list) and I will arrange it, there is a weekly reporting system already running at SORBS. Yours Matthew
trelane@trelane.net (Andrew D Kirch) writes:
There are however legitimate reasons for a portscan, responding to incoming abuse and attack being one of them, automatically searching for openrealys used to send you spam is another. Curtailing scanning shouldn't be a priority here, nailing packet kids, spammers etc should be. Sadly both of these groups don't seem to be going to jail in droves.
here's the way it works out. if a network is paying attention to complaints then it will shut down wormridden customer hosts based on some combination of complaints and observations, and there will be fewer legitimate port scans which if the network notices them they'll assume they're legitimate. if however a network is not paying attention to complaints then it will very likely become alarmed by their IDS when legitimate port scans come through, and then they'll (surprise!) call and complain about it. funny assymetry. anyway, when they call, and they learn that it was a legit port scan, then they can learn of the need to shut down wormridden customer hosts. so no matter what, it's good to listen to complaints, and good to complain. -- Paul Vixie
On Sun, 2 Nov 2003, Paul Vixie wrote:
so listen up. just because many of the infected hosts won't be disinfected, don't assume that there's no value in tracking and reporting them, or that there's no reason to spend money listening to and acting on complains about them. the internet's immune system needs *more* resources, not fewer.
I've had an idea kicking around my head since Paul posted this. Most of the reporting work seems to be centered around finding who to report problems to. I think we need to turn the problem around: Devise a system that assumes owners of IP space WANT to know about problems. In simple terms, a system that would let me issue a command such as report --open-proxy 192.168.1.1 (or even report --open-proxy 192.168.1.1 <logfiles ) and have a report sent to whoever needed to know about it. To participate in this, I would have to run a problem-report server that accepts reports on my IP space. It would be registered with some central server, that refers problems to the proper server for that IP address, like DNS. This might be a NOC to NOC tool, or perhaps useing registered PGP signatures, reports from other NOCs could have more weight then those from end users. In any case, the idea is to allow automated testing based on reports, aggragation of reports to weed out mistakes and errors, and provide a mechanisim for various firewalls, intusion detection systems, etc to talk to each other to solve problems as quickly as possible. So in the above example, if I receive the report for 192.168.1.1 being an open proxy, I might have my system configured, because that is a residential DSL IP, to automaticly do a full port scan on it to look for open proxies, and if I confirm that it is open shut the line down, or just kick out a ticket for someone to call the customer. Or, start a netflow analysis on it to look for virus/worm traffic. Or not do anything until a certain number of reports are received, weighted based on the ranking of PGP sigs. Paul's use of the word immune system hit it on the head. An immune system kicks in automaticly to fight infection, and right now there isn't one on the net. ========================================================== Chris Candreva -- chris@westnet.com -- (914) 967-7816 WestNet Internet Services of Westchester http://www.westnet.com/
Christopher X. Candreva wrote:
So in the above example, if I receive the report for 192.168.1.1 being an open proxy, I might have my system configured, because that is a residential DSL IP, to automaticly do a full port scan on it to look for open proxies, and if I confirm that it is open shut the line down, or just kick out a ticket for someone to call the customer. Or, start a netflow analysis on it to look for virus/worm traffic. Or not do anything until a certain number of reports are received, weighted based on the ranking of PGP sigs.
That's a start, but think about this. Worms are fast now. [1] Lets say you have 30 seconds to stop a worm from the time it hits the internet to until the time it's fully propagated to the point of serious network disruption. Automated techniques are the only thing that will stop it but is your idea "fast enough?" I don't think so. Relying on user reports is good for compromises and spambots but it won't do anything to stop CodeRed or Nimda.
Paul's use of the word immune system hit it on the head. An immune system kicks in automaticly to fight infection, and right now there isn't one on the net.
It has to automatically fight it, it has to be accurate and it has to be fast. I don't think anything comes close to that today. -davidu [1]: http://www.cs.berkeley.edu/~nweaver/cdc.web/ ---------------------------------------------------- David A. Ulevitch - Founder, EveryDNS.Net Washington University in St. Louis http://david.ulevitch.com -- http://everydns.net ----------------------------------------------------
On Wed, 12 Nov 2003, David A. Ulevitch wrote:
Automated techniques are the only thing that will stop it but is your idea "fast enough?" I don't think so. Relying on user reports is good for compromises and spambots but it won't do anything to stop CodeRed or Nimda.
True -- but I did say that this was a:
mechanism for various firewalls, intrusion detection systems, etc to talk to each other to solve problems as quickly as possible.
I don't think anything comes close to that today.
No, nothing does. This is a start. The example I gave of a command line tool was just that. The idea is a framework that people and tools can use to exchange information. I think the protocol itself -- the underlying system -- is what will be important. The command line program would be the second part of "Rough consensus and working code". As with DNS and web servers, I expect there would be many implementations, from inclusion in firewall programs to CPAN modules. ========================================================== Chris Candreva -- chris@westnet.com -- (914) 967-7816 WestNet Internet Services of Westchester http://www.westnet.com/
Devise a system that assumes owners of IP space WANT to know about problems. report --open-proxy 192.168.1.1 <logfiles and have a report sent to whoever needed to know about it.
http://www.Incidents.org http://www.Dshield.org/howto.php http://www.MyNetWatchman.com -bryan bradsby
On 1 Nov 2003, at 17:23, Sean Donelan wrote:
I have acted as a diplomat de jure negotating resumption of traffic between people blocking these network ranges and organizations in Japan in the past. In addition to Japan, the 211 netblock is assigned to organizations in other Asia Pacific countries.
ftp://ftp.apnic.net/public/apnic/dbase/data/country-ipv4.lst is probably your friend. 211/8 contains assignments/allocations to operators in Japan, Taiwan, Malaysia, Australia, Korea and China.
participants (10)
-
Andrew D Kirch
-
Bryan Bradsby
-
Christopher X. Candreva
-
David A. Ulevitch
-
Joe Abley
-
John_York@Dell.com
-
Matthew Sullivan
-
Paul Vixie
-
Sean Donelan
-
Suresh Ramasubramanian