Re: [tor-relays] Received botnet/drone abuse complaint

2012-01-02 Thread grarpamp
> I received a botnet/drone complaint from shadowserver.org today

If the complaint was sent directly to you, rather than to you via your
ISP, it is unlikely you need to do anything. Unless you're concerned
about possibly having your own IP space blacklisted (which is normally
an ISP concern).

If your ISP is bugging you, there are some abuse templates and general
advice docs on the Tor project site that you may find useful.

> If I'm reading this correctly, they identify "mebroot" as the source of the

That's probably the nasty that was sent, not necessarily the scan and
injection platform in use.

> My DirPort is set to 80, which may explain that value in the complaint.

No, that's more likely to be the 128:80 dest ip/port pair for the flow sourced
from your 210:48586 pair. You might find the log format documented at
Shadowserver or via google. They obviously didn't bother to include a
complete definition of all the fields in the email.

> Any thoughts on what to do to avoid further complaints?  Shadowserver
> addresses the topic of Tor exits here:

Try blocking traffic to that IP or some suitable larger subnet of the afflicted
IP as might be determined from whois or BGP, for a few months.

It's seems to be just a probe, nothing a simple email or config change
won't fix.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Received botnet/drone abuse complaint

2012-01-02 Thread Steve Snyder
I received a botnet/drone complaint from shadowserver.org today (delayed 
due to holidays) regarding my exit node:


timestamp ip port type infection cc cc_port
12/29/2011 19:52 173.208.132.210 48586 32097 US MISSOURI KANSAS CITY tcp 
mebroot ukixxuug.com|MAOS/0EC20201 14DF137A55320641 84.163.151.128 80 
3320 DE 1


If I'm reading this correctly, they identify "mebroot" as the source of 
the problem.  As this is a Windows MBR trojan it obviously doesn't apply 
to my Linux system.  I scanned my system anyway and found no unexpected 
processes running.


My DirPort is set to 80, which may explain that value in the complaint.

Any thoughts on what to do to avoid further complaints?  Shadowserver 
addresses the topic of Tor exits here:


http://www.shadowserver.org/wiki/pmwiki.php/Involve/TORNodesAndReporting

Thanks.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] planned downtime

2012-01-02 Thread Damian Johnson
> If someone chose to use, or only could use, his relays.
> Or to give a reason other than being raided or broke :)

A heads up would make sense if he was providing bridges, since that
would impact reachability for his users. However, if it's a normal
relay then there's really no point in sending a downtime notice. Paul
is right that we see hundreds of relays appear or disappear each day
and, besides a few particularly huge ones, the downtime probably
wouldn't be noticed.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] planned downtime

2012-01-02 Thread grarpamp
> Why and for whom is that relevant? Keep in mind that the Tor network
> handles churn quite well.

If someone chose to use, or only could use, his relays.
Or to give a reason other than being raided or broke :)
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Abuse complaints about brute forceing via ssh

2012-01-02 Thread Paul Staroch
Am 2012-01-02 12:23, schrieb cmeclax-sazri:
> On Sunday 01 January 2012 23:36:13 grarpamp wrote:
>> This 'attack' has been going on for YEARS. Nobody's really getting
>> shells (well some are), just dictionaried. The problem is that
>> OpenSSH logs this by default and people freak out when they
>> see it in their logs. It's just background noise. Real admins
>> tune it out and use ssh keys instead.
> I wrote a shell script that watches the logs and shuts off all access from an 
> address that starts guessing passwords.

That is exactly what tools like "fail2ban" are for.


Paul

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] planned downtime

2012-01-02 Thread Paul Staroch
Am 2012-01-02 12:25, schrieb cmeclax-sazri:
> Sometime this week (I haven't decided when yet) I'll be down for a few hours 
> to upgrade memory.
>
>

Why and for whom is that relevant? Keep in mind that the Tor network
handles churn quite well.


Paul

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] planned downtime

2012-01-02 Thread cmeclax-sazri
Sometime this week (I haven't decided when yet) I'll be down for a few hours 
to upgrade memory.

cmeclax
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Abuse complaints about brute forceing via ssh

2012-01-02 Thread cmeclax-sazri
On Sunday 01 January 2012 23:36:13 grarpamp wrote:
> This 'attack' has been going on for YEARS. Nobody's really getting
> shells (well some are), just dictionaried. The problem is that
> OpenSSH logs this by default and people freak out when they
> see it in their logs. It's just background noise. Real admins
> tune it out and use ssh keys instead.

I wrote a shell script that watches the logs and shuts off all access from an 
address that starts guessing passwords. My Linux box (which is what you get 
entering on port 22) doesn't have a root password (I use sudo), so anyone who 
tries to guess root passwords gets nothing but the door slammed shut in his 
face. Others try guessing "sales", "pgsql", "tony", "newsletter", "visitor", 
etc.; I don't think I've ever seen any guess my real username.

cmeclax
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays