Prev: Shutdown
Next: Nedit in kde4
From: Sleepy on
Hello group,

I dual boot openSUSE 11.1 and Windows on my work PC and during this
last
week my University has blocked my IP twice due to port searching (this
is
a translation, I am not sure if this is what it is called). In both
occasions, I was running openSUSE. I was wondering how I could find
out
what causes this. Apparentlysomeone/something tries to login to other
computers from my IP. Following are some of the complaints from the
admins with logs.

Before I format (which is the advice I got from IT department) to
solve
the issue, I want to find out the root of the problem. Is it possible
at
all?

I really appreciate your help,

Thanks a lot in advance,

Ufuk YILDIRIM


=================================================================
This is one of the complaints
Hi,

We've had probes from host(s) on a network you are marked as a
contact
for (*MY IP ADDRESS HERE*) to unadvertised ssh ports on a host of
ours:

zaphod: 82.197.80.100 - 82.197.80.96/27 (C4L)
cerryl: 82.197.80.126 - 82.197.80.96/27 (C4L)
allanon: 82.197.80.125 - 82.197.80.96/27 (C4L)
lerris: 84.12.252.174 - 84.12.252.168/29 (AI)

Timestamps are synched with NTP in timezone GMT (UTC +0000).

Logs are held for ~7 days. Let me know if you need more information.

Logs for IP *MY IP ADDRESS*:
---
Jan 17 08:43:42 zaphod sshd[19301]: Illegal user don from *MY IP
ADDRESS*
Jan 17 08:43:42 zaphod sshd[19303]: Illegal user don from *MY IP
ADDRESS*
Jan 17 08:43:42 zaphod sshd[19304]: Illegal user don from *MY IP
ADDRESS*
<snip more lines like these>

Jan 17 08:43:44 zaphod sshd[19303]: error: PAM: Authentication
service
cannot retrieve authentication info. for illegal user don from *MY IP
ADDRESS*
Jan 17 08:43:44 zaphod sshd[19305]: error: PAM: Authentication
service
cannot retrieve authentication info. for illegal user don from *MY IP
ADDRESS*
<More lines like these>

========================================================================
Another coplaint has the following:
Hello Abuse-Team,

your Server with the IP: *MY IP ADDRESS HERE* has attacked one of our
Server on the Service: "ssh".

========================================================================
Another one has the following info:

Feedback-Type: other
Service: ssh
Version: 0.2
Source-IP: *MY IP ADDRESS*
User-Agent: Fail2BanFeedbackAbuseScript
Received-Date: Jan 17 2010 09:00:25 +0100
Unix-Timestamp: 1263715225



Timezone +0100 CET
Lines containing IP:*MY IP ADDRESS* in /var/log/auth.log

Jan 17 09:00:22 server3 sshd[2081]: Connection from *MY IP ADDRESS*
port 56413
Jan 17 09:00:23 server3 sshd[2081]: Invalid user compta from *MY IP
ADDRESS*
Jan 17 09:00:23 server3 sshd[2081]: debug1: PAM: setting PAM_RHOST to
"*MY IP ADDRESS*2"
Jan 17 09:00:23 server3 sshd[2083]: (pam_unix) authentication
failure;
logname= uid=0 euid=0 tty=ssh ruser= rhost=*MY IP ADDRESS*
Jan 17 09:00:25 server3 sshd[2081]: error: PAM: User not known to the
underlying authentication module for illegal user compta from *MY IP
ADDRESS*
Jan 17 09:00:25 server3 sshd[2081]: Failed keyboard-interactive/pam
for
invalid user compta from *MY IP ADDRESS* port 56413 ssh2

From: Stephen Horne on
On Fri, 22 Jan 2010 14:54:20 -0800 (PST), Sleepy <ufuknews(a)gmail.com>
wrote:

>Apparentlysomeone/something tries to login to other
>computers from my IP. Following are some of the complaints from the
>admins with logs.

I don't have the expertise to understand the rest of your post, but my
guess would be that someone has been running manual exploits from a
session on your machine.

Once you're on the network, all anyone really needs to do this is your
username and password. They can log into your machine as you, even
while you're already logged in, and you probably won't see anything
worrying unless you're looking for it.

Then they can start trying exploits from that session on your machine,
and your IP gets the blame.

Obviously, a format won't fix this - at least not if you use the same
passwords again. That said, who knows what else your intruder was
doing? If he has your user account password, maybe he also has your
root password? Maybe he has configured your system so he can get easy
access? Reformatting and reinstalling might be a good idea.

If you can find a local Linux expert, maybe he can check the logs on
your machine. You may be able to find an IP address for the real
culprit.

More importantly, change all your passwords, and make sure you haven't
got any kind of password-free anonymous login stuff enabled.

From: DenverD on
Sleepy wrote:

> I dual boot openSUSE 11.1 and Windows on my work PC

unless you are certain the machine was booted into openSUSE at the
exact time of the attacks, i would FIRST assume your Windows system
has become a zombie netbot..

clean it first [i have no idea how, probably BUY a cleaner]...i reckon
all those problems will then go away..

however, if your openSUSE is not up to date with all security patches,
and/or you use unsafe practices (easy/dictionary passwords, run
KDE/Gnome/etc as root, etc) you could have allowed your Linux box to
be rooted, also..

--
DenverD (Linux Counter 282315) via Thunderbird 2.0.0.23 (20090817),
KDE 3.5.7 "release 72-11", openSUSE Linux 10.3, 2.6.22.19-0.4-default
#1 SMP i686 athlon
From: Günther Schwarz on
Sleepy wrote:

> I dual boot openSUSE 11.1 and Windows on my work PC and during this last
> week my University has blocked my IP twice due to port searching (this
> is
> a translation, I am not sure if this is what it is called).

From the log file information you provide these were simple attempts to
log in on a ssh server. No port scanning was involved.

> In both
> occasions, I was running openSUSE. I was wondering how I could find out
> what causes this. Apparentlysomeone/something tries to login to other
> computers from my IP. Following are some of the complaints from the
> admins with logs.

> ================================================================= This
> is one of the complaints
> Hi,
>
> We've had probes from host(s) on a network you are marked as a contact
> for (*MY IP ADDRESS HERE*) to unadvertised ssh ports on a host of ours:
>
> zaphod: 82.197.80.100 - 82.197.80.96/27 (C4L) cerryl: 82.197.80.126 -
> 82.197.80.96/27 (C4L) allanon: 82.197.80.125 - 82.197.80.96/27 (C4L)
> lerris: 84.12.252.174 - 84.12.252.168/29 (AI)

> Logs for IP *MY IP ADDRESS*:
> ---
> Jan 17 08:43:42 zaphod sshd[19301]: Illegal user don from *MY IP
> ADDRESS*

> ========================================================================
> Another coplaint has the following:
> Hello Abuse-Team,
>
> your Server with the IP: *MY IP ADDRESS HERE* has attacked one of our
> Server on the Service: "ssh".
>
> ========================================================================
> Another one has the following info:

> Lines containing IP:*MY IP ADDRESS* in /var/log/auth.log
>
> Jan 17 09:00:22 server3 sshd[2081]: Connection from *MY IP ADDRESS* port
> 56413
> Jan 17 09:00:23 server3 sshd[2081]: Invalid user compta from *MY IP
> ADDRESS*

Provided there was no IP spoofing involved and your machine was indeed
running Linux at the date and time in question somebody tried to log in
to the machines 82.197.80.100 as user don and to a host named server3 as
user compta from your machine.
Which humans do have access to your system? What is the output of
# getent passwd
In case you are the only person who has an account on your system and you
did not try to do a ssh login on the remote machines yourself this is
fishy indeed. You might try tools like rkhunter which are searching for
known malware. Run it from a live CD and not from the installation on the
hard disk.
You can configure iptables (SUSE firewall) to block outgoing ssh
connections completely. But in case the installation is compromised this
will not solve the problem. A new install after securing the user data
will be the quickest fix. Do not reuse your old password on the new
installation. Good luck.

Günther
 | 
Pages: 1
Prev: Shutdown
Next: Nedit in kde4