From: Rick on
Moe Trin wrote:
> On Sun, 21 Feb 2010, in the Usenet newsgroup comp.security.firewalls, in
> article<hlrvgm$66h$1(a)news.eternal-september.org>, Rick wrote:
>
>> Moe Trin wrote:
>
>>> Rick wrote:
>
>>>> I have 1 ftp server and 3 simple pc's.
>>>> Only the ftp server gets "port scanned".
>>>> How do they know to scan that one?
>
>>> They don't. Are all four systems equally visible from the world?
>>> Does each one have it's own `world reachable' IP address?
>
>> There is 1 external, non-static IP ==>modem==>router(DMZ)==>SonicWall==>
>> linux FTP server, windows xp3, windoes xp3.
>
> One external address -> several systems. How is the SonicWall told
> to route packets. Send them equally to all systems? Of course not.
> Obviously it's not going to send packets for port 20-21/ftp to the
> workstations, because that's not where the FTP server is. So look at
> the way you've configured the SonicWall.
>
>> The latter all use LAN ip addresses of course.
>
> So it's all the SonicWall that's deciding how to route packets.
>
>> Since any ftp "user" would have to know the secret handshake I am
>> wondering how the chinese and the koreans know about the ftp server!
>
> Unlikely that they do - they're scanning the entire external IP
> range - perhaps as widely as 1.0.0.1 to 222.255.255.254 looking to
> see "what is there". Linux server - do you have nmap installed?
> The man page is extensive, and there's probably a lot more
> documentation in /usr/share/nmap*/. They scan your address - let's
> say it's 192.0.2.11 on the external side, and your SonicWall forwards
> those packets to....


Nope, the Sonicwall LOG FILE says that those packets have been DROPPED
(unceremoniously I presume).


>> - just curious
>
> Do you intend to offer FTP service to every IP address in the world, or
> are you only intending to offer to North America, Pennsylvania, or
> New York City? IP addresses are not allocated/assigned in a simple
> manner arranged for convenient filtering. For example, the IPv4 address
> range 130.0.0.0 - 130.255.255.255 is allocated/assigned to 228 networks
> in ten countries from New Zealand and Japan through Europe (Denmark and
> France) to North America (Canada and USA). See
> http://www.iana.org/assignments/ipv4-address-space for regional clues.
> As of the 15th, there were 3007 million IPv4 addresses in 228 countries
> in 100341 IP blocks.
>
> Old guy

To get past the sonicwall you have to have the password (global vpn
client) or the "secret" for the SSL tunnel (I think that's what it's
called.).


From: Skywise on
Regis <ordsec(a)gmail.org> wrote in
news:84635p9rjz(a)e6g2000prf.googlegroups.com:

> More constructively, though the upshod here is that access attempts
> and port scans should be quite expected on any internet facing IP
> address.

Even to the level of the ordinary home user logging in to their
ISP on a dialup modem.

I recall watching my software firewall back in those days routinely
blocking occasional port scans.

Brian
--
http://www.skywise711.com - Lasers, Seismology, Astronomy, Skepticism
Seismic FAQ: http://www.skywise711.com/SeismicFAQ/SeismicFAQ.html
Quake "predictions": http://www.skywise711.com/quakes/EQDB/index.html
Sed quis custodiet ipsos Custodes?
From: Regis on
Rick <rick0.merrill(a)gmail.com.lessspam> writes:

> Are you saying that they are checking EVERY POSSIBLE IP number?

Not necessarily. Maybe. Probably. Depends on who's doing the
scanning. Could be some other subscriber on your ISP scanning from
afar out of curiosity, could be an attacker mapping out known
registered DHCP pools from your ISP, or all ISP's. The bot herders
are just looking for targets, and a lot of it may be automated scans
done by other malware. You never know.

> That should take a pretty LONG TIME,

Not as long as you might think, and with so many computers, attackers
and enterprising blackhats with botnets to distribute the work, it's
doable.

> yet here they are back-again the next day:
>
> 02/19/2010 59:05.5 " TCP" " 125.65.112.161,"
> security(a)mail.sc.cninfo.net 12200, X1 - " 192.168.1.205,"
> 8000, X1 - " TCP" Port: 8000
> 02/20/2010 06:30.2 " TCP" " 125.65.112.161,"
> security(a)mail.sc.cninfo.net 12200, X1 - " 192.168.1.205,"
> 7212, X1 - " TCP" Port: 7212
> 02/20/2010 23:03.2 " TCP" " 125.65.112.161,"
> security(a)mail.sc.cninfo.net 12200, X1 - " 192.168.1.205,"
> 7212, X1 - " TCP" Port: 7212
> 02/20/2010 55:58.8 " TCP" " 125.65.112.161,"
> security(a)mail.sc.cninfo.net 12200, X1 - " 192.168.1.205,"
> 7212, X1 - " TCP" Port: 7212
>
> 4 failed attempts from the same originator. I can only see explaining
> that by assuming that they somehow KNOW my server is there. How do
> they know it is there? Would it help to get a new IP address?

Do not ascribe to directed malice that which can be more adequately
explained by the usual, happens every day to everybody large scale
reconnaissance.



From: Rick on
Regis wrote:
> Rick<rick0.merrill(a)gmail.com.lessspam> writes:
>
>> Are you saying that they are checking EVERY POSSIBLE IP number?
>
> Not necessarily. Maybe. Probably. Depends on who's doing the
> scanning. Could be some other subscriber on your ISP scanning from
> afar out of curiosity,

Sam Spade says that is definitely not the case.


> could be an attacker mapping out known
> registered DHCP pools from your ISP, or all ISP's.

Checking the attacker ip shows that is not the case either.
I certainly agree that it COULD be, and one time it was and
believe-it-or-not I actually got them to fix their vampired server.


> The bot herders
> are just looking for targets, and a lot of it may be automated scans
> done by other malware. You never know.

Yes, I know, but I think we should institute our own Fire-Back Bot Herd!


>> That should take a pretty LONG TIME,
>
> Not as long as you might think, and with so many computers, attackers
> and enterprising blackhats with botnets to distribute the work, it's
> doable.

One assumes that IP6 will make such work more difficult!


>> yet here they are back-again the next day:
>>
>> 02/19/2010 59:05.5 " TCP" " 125.65.112.161,"
>> security(a)mail.sc.cninfo.net 12200, X1 - " 192.168.1.205,"
>> 8000, X1 - " TCP" Port: 8000
>> 02/20/2010 06:30.2 " TCP" " 125.65.112.161,"
>> security(a)mail.sc.cninfo.net 12200, X1 - " 192.168.1.205,"
>> 7212, X1 - " TCP" Port: 7212
>> 02/20/2010 23:03.2 " TCP" " 125.65.112.161,"
>> security(a)mail.sc.cninfo.net 12200, X1 - " 192.168.1.205,"
>> 7212, X1 - " TCP" Port: 7212
>> 02/20/2010 55:58.8 " TCP" " 125.65.112.161,"
>> security(a)mail.sc.cninfo.net 12200, X1 - " 192.168.1.205,"
>> 7212, X1 - " TCP" Port: 7212
>>
>> 4 failed attempts from the same originator. I can only see explaining
>> that by assuming that they somehow KNOW my server is there. How do
>> they know it is there? Would it help to get a new IP address?
>
> Do not ascribe to directed malice that which can be more adequately
> explained by the usual, happens every day to everybody large scale
> reconnaissance.

Actually, I did not say 'malice' although it's fair for you to assume it
- they might just be curious, as I am, about what's out there.

From: Leythos on
In article <hm0uof$1h0$2(a)news.eternal-september.org>,
rick0.merrill(a)gmail.com.lessspam says...
> So you're saying it is a coincidence and I should "echo off paranoia".
>

I have 32 IP addresses and a Commercial Grade firewall on our network.
We see about 8000 attempts per day across those IP's - it's almost
always a range of ports they scan from the same IP - the ones I consider
the largest threat are the ones that scan 5-10 ports every day, slowly,
so that they are harder to detect if you're not sure what you're looking
for.

Do I worry about them - not much, but I have about 60 IP subnets in our
permanent block list (mostly outside the USA).

--
You can't trust your best friends, your five senses, only the little
voice inside you that most civilians don't even hear -- Listen to that.
Trust yourself.
spam999free(a)rrohio.com (remove 999 for proper email address)