Re: SIP VoIP botnet question

2010-09-19 Thread Stuart Henderson
On 2010-09-18, packetfilte...@gmail.com  wrote:
> Hi
>
> Can someone shed some light on the following (pfSense) PF log entries;

Don't know pfSense, but these logs appear to show the firewall blocking
some traffic that you told it to block.

> I've been experiencing a lot of problems when trying to log into online 
> banking and Googlemail and sometime see private IP addresses between my 
> ADSL router and my ISP's gateway.

Talk to pfSense people or your ISP.
My guess would be broken path mtu discovery.

http://www.elifulkerson.com/projects/mtu-eyechart.php

> I don't use VoIP

Makes no difference to people scanning; they will search for endpoints
on your network whether or not you have them.

(Not for you, but for people who do run voip then for the love of
$DEITY keep an eye on security. use strong passwords so you just get
the log spam and packets-per-second and not the phone bills too,
and make sure you have a handle on how you've configured your
software; e.g. with asterisk don't get confused about contexts,
and if you use "insecure" flags anywhere then understand what
it does and make sure it's safe..)

> However I'm using RST and DEST-UNR which may invite a botnet or 
> feeling lucky today script kid.
>
> Resetting the PF state seems to alleviate the problem at least partially 
> but even though PF logs that the packet was locked it seems to be 
> causing problems. Is it some sort of arp poisoning or UDP injection 
> which is stuffing the routing tables.

Huh?



Re: SIP VoIP botnet question

2010-09-19 Thread Henning Brauer
* packetfilte...@gmail.com  [2010-09-18 23:34]:
> Can someone shed some light on the following (pfSense) PF log entries;

wrong list.

some ancient (that is the very friendly wording) pf version on some OS
that isn't OpenBSD which has been modified. how would we know?


-- 
Henning Brauer, h...@bsws.de, henn...@openbsd.org
BS Web Services, http://bsws.de
Full-Service ISP - Secure Hosting, Mail and DNS Services
Dedicated Servers, Rootservers, Application Hosting



Re: SIP VoIP botnet question

2010-09-19 Thread Mark R
install ngrep and run

ngrep -q -t -P "" -W byline -d ng0 SIP

Should show the sip packets in a more friendly format.



On Sat, Sep 18, 2010 at 10:29 PM, packetfilte...@gmail.com <
packetfilte...@gmail.com> wrote:

> Hi
>
> Can someone shed some light on the following (pfSense) PF log entries;
>
>
> 36. 281054 rule 80/0(match): block in on ng0: (tos 0x0, ttl 45, id 51305,
> offset 0, flags [DF], proto UDP (17), length 437) 124.92.251.2.5060
>  > 91.84.205.47.5060: SIP, length: 409
>
>
> OPTI\200\242\224LL\223\006\000`\000\000\000p\000\000\000\024\000\000\000=\002\001\000ng0\000\000\000\000\000\000\000\000\000\000\000\
>
> 000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000P\377\377\377\377\377\377\377\377\240\206\001\000\000\000\
> 000\000\306\320\000\000\001\000\000\000E\000\\330i@
> \000q\006\201\271\274\201\312\242[T\315,\012\360\001\275e\267\010\177\000\000\000\000{
>
> \242\224Lfv\002\000`\000\000\000t\000\000\000\024\000\000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\00
>
> 0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000h\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000\306\320\000\00
> 0\001\000\000\000E\000\0004\342;@
> \000?\006=\314\012\261\301RBf\015S9,\001\273\327\020\370\272\000\000\000\000{\242\224L>\202\002\000`\000\000
>
> \000t\000\000\000\024\000\000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\00
>
> 0\000\000\000\000\000\000\000\000h\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000\306\320\000\000\001\000\000\000E\000\0004\
> 031q@
> \000?\006\006\227\012\261\301RBf\015S9-\001\273\327\024;\305\000\000\000\000{\242\224L\343\323\003\000`\000\000\000t\000\000\000\024\000
>
> \000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000
>0x:  4f50 5449
>
>
>
> Sep 18 16:36:42 pf: From: 
> "sipsscuser">;
> t\000\000\000\000\200\002\301\350\006\226\000\000\002\004\005\254\001\00
>
> 3\003\000\001\001\004\002t\000\000\000\024\000\000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\0
>
> 00\000\000\000\000\000\000\000\000\000\000\000\000\000h\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000}\025\000\000\001\000\
> 000\000E\000\0004\031\023@
> \000?\006\204\207\012\261\301R\255\302$d5\214\000P\013SL\352\000\000\000\000\200\002\301\350\200\364\000\000\002\00
>
> 4\005\254\001\003\003\000\001\001\004\002\024\000\005\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\00
>
> 0\000\000\000\000\000\000\000\000\000\000\000\000\000\000m\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000}\025\000\000\001\0
> 00\000\000e\000\0004\304\...@\000?\006
> \276\012\261\301R\331\222\260\3515\207\003\343\012\005h\275\000
> Sep 18 16:36:42 pf: Content-Length: 0
> Sep 18 16:36:42 pf: Via: SIP/2.0/UDP 192.168.1.9:5060
> ;branch=z9hG4bK-02932966;rport
> Sep 18 16:36:42 pf: OPTIONS 
> sip:1...@91.84.205.44SIP/2.0
>
>
>
> I've been experiencing a lot of problems when trying to log into online
> banking and Googlemail and sometime see private IP addresses between my ADSL
> router and my ISP's gateway. Does anybody know if these log entries may be
> associated with some malicious activities as they were created whilst I was
> unable to log into Googlemail earlier today.
>
> I don't use VoIP and use a default deny firewall (ie; both in and out)
> policy. However I'm using RST and DEST-UNR which may invite a botnet or
> feeling lucky today script kid.
>
> Resetting the PF state seems to alleviate the problem at least partially
> but even though PF logs that the packet was locked it seems to be causing
> problems. Is it some sort of arp poisoning or UDP injection which is
> stuffing the routing tables.
>
> Can anyone offer any advice.
>
> Thanks
>
> Rhys



SIP VoIP botnet question

2010-09-18 Thread packetfilte...@gmail.com

Hi

Can someone shed some light on the following (pfSense) PF log entries;


36. 281054 rule 80/0(match): block in on ng0: (tos 0x0, ttl 45, id 
51305, offset 0, flags [DF], proto UDP (17), length 437) 124.92.251.2.5060

 > 91.84.205.47.5060: SIP, length: 409

OPTI\200\242\224LL\223\006\000`\000\000\000p\000\000\000\024\000\000\000=\002\001\000ng0\000\000\000\000\000\000\000\000\000\000\000\
000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000P\377\377\377\377\377\377\377\377\240\206\001\000\000\000\
000\000\306\320\000\000\001\000\000\000e\000\\3...@\000q\006\201\271\274\201\312\242[t\315,\012\360\001\275e\267\010\177\000\000\000\000{
\242\224Lfv\002\000`\000\000\000t\000\000\000\024\000\000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\00
0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000h\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000\306\320\000\00
0\001\000\000\000E\000\0004\342;@\000?\006=\314\012\261\301RBf\015S9,\001\273\327\020\370\272\000\000\000\000{\242\224L>\202\002\000`\000\000
\000t\000\000\000\024\000\000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\00
0\000\000\000\000\000\000\000\000h\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000\306\320\000\000\001\000\000\000E\000\0004\
0...@\000?\006\006\227\012\261\301rbf\015s9-\001\273\327\024;\305\000\000\000\000{\242\224L\343\323\003\000`\000\000\000t\000\000\000\024\000
\000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000
0x:  4f50 5449



Sep 18 16:36:42 pf: From: "sipsscuser"; 
t\000\000\000\000\200\002\301\350\006\226\000\000\002\004\005\254\001\00

3\003\000\001\001\004\002t\000\000\000\024\000\000\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\0
00\000\000\000\000\000\000\000\000\000\000\000\000\000h\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000}\025\000\000\001\000\
000\000e\000\0004\031\...@\000?\006\204\207\012\261\301r\255\302$d5\214\000p\013sl\352\000\000\000\000\200\002\301\350\200\364\000\000\002\00
4\005\254\001\003\003\000\001\001\004\002\024\000\005\000=\002\000\000fxp0\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\00
0\000\000\000\000\000\000\000\000\000\000\000\000\000\000m\377\377\377\377\377\377\377\377\240\206\001\000\000\000\000\000}\025\000\000\001\0
00\000\000e\000\0004\304\...@\000?\006 
\276\012\261\301R\331\222\260\3515\207\003\343\012\005h\275\000

Sep 18 16:36:42 pf: Content-Length: 0
Sep 18 16:36:42 pf: Via: SIP/2.0/UDP 
192.168.1.9:5060;branch=z9hG4bK-02932966;rport

Sep 18 16:36:42 pf: OPTIONS sip:1...@91.84.205.44 SIP/2.0



I've been experiencing a lot of problems when trying to log into online 
banking and Googlemail and sometime see private IP addresses between my 
ADSL router and my ISP's gateway. Does anybody know if these log entries 
may be associated with some malicious activities as they were created 
whilst I was unable to log into Googlemail earlier today.


I don't use VoIP and use a default deny firewall (ie; both in and out) 
policy. However I'm using RST and DEST-UNR which may invite a botnet or 
feeling lucky today script kid.


Resetting the PF state seems to alleviate the problem at least partially 
but even though PF logs that the packet was locked it seems to be 
causing problems. Is it some sort of arp poisoning or UDP injection 
which is stuffing the routing tables.


Can anyone offer any advice.

Thanks

Rhys