Unbelievable...   I will look into this also and correspond any findings via
private e-mail first.


On Tue, Feb 9, 2010 at 9:04 AM, David Kaiser <dkai...@cdk.com> wrote:

> Last night I submitted the attached e-mail to the abuse department at
> rr.com as well as to federal authorities.  I believe the attached e-mail
> and the corresponding web page (http://socallinux.org/attack/log.html)
> are self-explanatory.
>
> Additionally, I need to point out the following:
>
> * we are NOT cool with actions like this being run against our server.
> this incident is NOT considered friendly.  it is not any type of
> research. nobody was invited to run an attack on our server.  (just
> making that clear)
>
> * the server host for socallinux.org is being actively monitored
>
> * we have taken steps to eliminate or reduce any damage by any attempted
> hacks (having current backups, etc.) should anything ever be defaced, etc.
>
> * we take these offenses very seriously and are working with law
> enforcement to report incidents
>
>
> Finally, we know the IP address (67.52.151.102) is in a netblock which
> we can assume belongs to dan tentler.  the netblock is listed as follows:
>  network:ID:NETBLK-ISRC-67.52.128.0/19
>  network:Auth-Area:67.52.151.96/29
>  network:Network-Name:IT-KINETIX-67.52.151.96
>  network:IP-Network:67.52.151.96/29
>  network:IP-Network-Block:67.52.151.96 - 67.52.151.103
>  network:Organization;I:IT-KINETIX
>  
> network:Tech-Contact;I:ipadd...@rr.com<network%3atech-contact%3bi%3aipadd...@rr.com>
>  network:Admin-Contact;I:IPADD-ARIN
>  
> network:AbuseEmail:d...@itkinetix.com<network%3aabuseemail%3a...@itkinetix.com>
>
> if you do an ARIN whois search on those 8 IP addresses (67.52.151.96
> through 67.52.151.103) you fill find they are all a part of the same
> assigned netblock.  (try the following command to search ARIN records:
> whois -h whois.arin.net 67.52.151.102 )
>
> other domains hosted in the netblock include: atenlabs.com and
> thaumatocracy.com, which are known to be under dan's control.  (you can
> look up their IP#'s yourself.)
>
> Having said that...  we don't have any concrete evidence or proof who
> actually was behind this attack.  (It is theoretically possible that
> someone could have gained control of a host inside that network and done
> this without Dan's permission.)  I am not making an accusation that Dan
> himself did this.  In my reporting of the incident to the authorities I
> am only providing the information as I have here (providing log files
> and analysis through domain registration records, etc.)
>
> I'm being very clear here and only stating non-opinion facts because
> sometimes people confuse opinions with accusations.  I would advise
> anyone to also stay clear of opinions and anything that even could be
> construed as an accusation of wrongdoing against any individual if they
> reply to this message.
>
> I'm posting this today so everyone on the list can analyze the log
> files, take a look at them and you can start to understand how nmap
> works.  If you look at the linked access.log file, you can also see the
> specific mailman CGI URL's that were being targeted for privilege
> escalation.  It's an opportunity to learn a bit about what a public
> server faces from time to time.
>
> If you have any questions, let me know.
>
> DK
>
>
>
> ---Begin Forwarded Message---
>
> To: RR.COM abuse department <ab...@rr.com>,
>    RR.COM Security department <secur...@rr.com>
> Cc: IT-KINETIX abuse department <d...@itkinetix.com>
> Subject: Malicous activity from IP address 67.52.151.102 (itkinetix.com)
>
> For the past few days an Internet host that I help maintain has been the
> recipient of a large amount of malicous activity from an IP number
> within your network. This activity has included wide-range port
> scanning, probing for vulnerable services, attempts to obtain secured
> and private information, and attempts to gain privilege or gain elevated
> privilege from the system.
>
> The host in your network has an IP address of: 67.52.151.102 with a
> reverse DNS record pointing to ns2.itkinetix.com.  I have Cc:d the abuse
> contact, d...@itkinetix.com, in this complaint, based on that e-mail
> being listed as the abuse contact in the ARIN record for itkinetix.com
>
>
> Please see the specific log content and linked files at
> http://socallinux.org/attack/log.html
>
>
> While it can be argued, in some jurisdictions, that port scanning is not
> illegal, it can be clearly seen that in this case, a particular scanner
> is making multiple attempts to discover available and potentially
> vulnerable services on the system.  Combined with the attempts to obtain
> user account information (trying to force a CGI to return the contents
> of /etc/passwd) as well as trying to force a CGI to edit stored HTML
> content, we believe these actions are intentional and done with malicous
> intent.
>
> Based on the RoadRunner "System and Network Security" Policy listed at:
> http://help.rr.com/HMSFaqs/e_sys_net_security.aspx?Topic=Policies
>
> (specifically the first bullet point which reads "Unauthorized access to
> or use of data, systems or networks, including any attempt to probe,
> scan or test the vulnerability of a system or network or to breach
> security or authentication measures without express authorization of the
> owner of the system or network."   ...we are sure this activity is a
> direct violation of RoadRunner's policies, and definitively constitutes
> unauthorized activity.
>
> We are appealing to RoadRunner to provide an immediate and thorough
> removal of the offending host and to put in place a solution which
> prevents this offense from affecting our server again.
>
> Please be advised that we have also filed a complaint with the Internet
> Crime Complaint Center (www.ic3.gov) and this incident has been assigned
> Complaint ID: I1002090519458152   You may be contacted by a
> representative of one of the IC3 agencies for clarification of details.
>
> We expect a response from rr.com within 24 hours with a complete list of
> actions taken to meet this request.
>
> Upon request, we can provide the complete firewall logs detailing the
> over 16000 TCP connection attempts (made from this one host) in 4
> different port scanning sessions.
>
> Thank you for your attention to this matter.
>
> David Kaiser <dkai...@cdk.com>
> Representing SocalLinux.org system administrators
>
> _______________________________________________
> LinuxUsers mailing list
> LinuxUsers@socallinux.org
> http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers
>
_______________________________________________
LinuxUsers mailing list
LinuxUsers@socallinux.org
http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers

Reply via email to