Excerpts from Charles Jones's message of Mon Mar 30 08:46:35 -0700 2009: > Andrew "Tuna" Harris wrote: > > Excerpts from kitepi...@kitepilot.com's message of Mon Mar 30 05:30:51 > > -0700 2009: > > > >> And how do I: > >> "starting by iptable deny all of china" ? > >> > >> I can figure out the "iptable" part, it is the "china" part (and other > >> possible places where I know I will only get spam from) that I am unaware > >> of... > >> > >> Thanks! > >> Enrique > >> > >> > > > > Easy! There are online lists of Chinese and Korean IP blocks that you > > can deny. I found one that came with a perl script to do it all > > automagically. > > > > http://is.gd/pEsB > > > > That guy has some other interesting things too. Nice blog he's got goin' > > there. > > > > But I HIGHLY suggest you read those files to make sure there's nothing > > you don't want blocked out. You can just comment out things you don't > > want blocked in the access.list file. It's all plaintext. > > > > And definitely give ANYTHING you run as root a second look. This script > > is okay for me but it's always good to be a little paranoid. > > > > > >> Lisa Kachold writes: > >> > >> > >>> Well, the sad fact is that _any_ machine will kick over and barf it's > >>> guts under distributed attacks; it just depends on what it does after the > >>> green slime clears.. > >>> Also, it really helps if you run one that won't take WRT, or only runs on > >>> an arm, with small memory therefore they aren't too hot to pwn you. > >>> Linksys put out the source, whereupon I built my own, and played with the > >>> features; you know kiddies are doing this also. > >>> > >>> Course, if you have a WRT-able router, it's a good idea to set it up as a > >>> small linux system, but you have to know how to work it; starting by > >>> iptable deny all of china is a good start. > >>> I have had mine owned regularly; I just flash it again. Mine is easy to > >>> determine, since it suddenly starts showing AIM ports open. Once they > >>> target you successfully, they will insidiously continue to keep track of > >>> you; rather like trophy hunting. > >>> I could have done a complete defcon presentation on various routers by > >>> this time. > >>> That's why I always suggest to everyone, if you see something strange, > >>> you see something strange, report it, complain, study it, rather than > >>> continuing to agree with everyone in denial about the sad state of > >>> security. > >>> Obnosis | (503)754-4452 > >>> > >>> > >>> > >>> > >>> PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM > >>> > >>> > >>> > >>> > >>> > >>> > >>> > >>>> Subject: Re: OT? Linux-based trojans now targeting WRT and other > >>>> linux-based routers > >>>> From: t...@supertunaman.com > >>>> To: plug-discuss@lists.plug.phoenix.az.us > >>>> Date: Fri, 27 Mar 2009 17:57:34 -0700 > >>>> > >>>> Excerpts from Charles Jones's message of Fri Mar 27 14:19:05 -0700 2009: > >>>> > >>>>> http://www.linux-magazine.com/online/news/psyb0t_attacks_linux_routers_update > >>>>> > >>>>> Some parts of this article made me LOL. Like: > >>>>> > >>>>> "One type of malware connects primarily to a chat system such as IRC, > >>>>> which your ordinary 14-year-old might join for the latest superstar > >>>>> gossip." > >>>>> > >>>>> and: > >>>>> > >>>>> "Each IRC network usually has hundreds of these channels, typically > >>>>> starting with a hash mark in its name, such as #superstars." > >>>>> > >>>>> and: > >>>>> > >>>>> "A participant joining a channel who is not a human is usually a > >>>>> program > >>>>> called a bot. There are all kinds of bots lurking in the IRC, some of > >>>>> them explain UNIX commands, look up bus schedules or forecast the > >>>>> weather. Some, however, await special, often secret, commands" > >>>>> > >>>>> Which prompted me to say on IRC: > >>>>> [03-27-2009 14:11:10] <Charles> hahaha > >>>>> [03-27-2009 14:12:54] * Charles is awaiting special secret commands > >>>>> [03-27-2009 14:13:28] <Charles> but only if you are a superstar > >>>>> > >>>>> Seriously though, I sadly have a lot of experience being attacked by, > >>>>> and hunting down and eradicating botnets. Infected routers are really > >>>>> evil, since your typical user has no way to notice or see that > >>>>> something > >>>>> is running that should not be. This could become a real problem as WRT > >>>>> and other linux-based routers become more popular. > >>>>> > >>>> I just wish I had come up with the idea of WRT-based botnets first. :< > >>>> > >>>> I guess the vendors will just have to set randomly generated default > >>>> passwords, and pass along a little card that says "omgwtfbbq ur password > >>>> lol". But you KNOW that they'll never get around to that soon. > >>>> --------------------------------------------------- > >>>> > I only perused it quickly, but it looked to me like that guys script > blocks EVERYTHING except trusted IPs, not just china? It has an "INPUT > -p tcp --dport 22 -j DROP" at the end. I don't understand why it goes > through the trouble to block china IP blocks, if its blocking > *everything* other than the trusted list anyway? Right, so just comment out that bit and you're fine.
> "*The access.list file is pre-configured to drop packets from all of the > IP blocks* at http://www.okean.com/antispam/sinokorea.html. However, > you should jump to the bottom of *access.list* and add any trusted IP's > (e.g., work and home) that you want to accept SSH traffic from. _By > default, any other incoming requests on port 22 from addresses you don't > trust will be dropped_." > > Please tell me if I am wrong, after all it is Monday morning and I may > not be thinking clearly :) --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss