Dan has claimed that he was asleep during the attacks. http://twitter.com/Viss/status/8873238707
However http://twitter.com/Viss/status/8803995420 proves he was awake -Chris On Tue, Feb 9, 2010 at 2:49 PM, David Kaiser <dkai...@cdk.com> wrote: > Chris, thanks for the excellent research. > > About 5 minutes after I sent the complaint e-mails out last night I did > a complete firewall block on these IP's: > 67.52.151.96 67.52.151.97 67.52.151.98 67.52.151.99 > 67.52.151.100 67.52.151.101 67.52.151.102 67.52.151.103 > > So, as of 2:40AM, the IP's have been blocked, and will stay blocked > indefinitely. > > I'll check out these other ones that are not part of 67.52.151.96/29 > after I get home from work. > > > Chris Penn wrote: >> Last Time I check: >> itkinetix.com. 14400 IN SOA inertia.itkinetix.com. >> d...@itkinetix.com. ( >> 2006010408 ; Serial >> 14400 ; Refresh >> 7200 ; Retry >> 3600000 ; Expire >> 86400 ) ; Minimum TTL >> itkinetix.com. 14400 IN NS ns.itkinetix.com. >> itkinetix.com. 14400 IN NS ns2.itkinetix.com. >> itkinetix.com. 14400 IN MX 0 ns.itkinetix.com. >> itkinetix.com. 14400 IN A 67.52.151.98 >> sneaky.itkinetix.com. 14400 IN A 67.52.151.99 >> secure.itkinetix.com. 14400 IN A 67.52.151.98 >> mail.itkinetix.com. 14400 IN A 67.52.151.98 >> www.itkinetix.com. 14400 IN A 67.52.151.98 >> wiki.itkinetix.com. 14400 IN A 67.52.151.102 >> gearfuse.itkinetix.com. 14400 IN A 74.53.94.162 >> inertia.itkinetix.com. 14400 IN A 67.52.151.98 >> aten.itkinetix.com. 14400 IN A 67.52.151.102 >> ns.itkinetix.com. 14400 IN A 67.52.151.98 >> ns2.itkinetix.com. 14400 IN A 67.52.151.102 >> >> >> Might want to monitor the entire block >> 67.52.151.98/32 >> 67.52.151.102/32 >> >> This another one of Dan's older sites I believe. Might want to >> monitor for these IPs as well: >> >> thaumatocracy.com. 14400 IN SOA ns.itkinetix.com. >> ns2.itkinetix.com. ( >> 2006010044 ; Serial >> 14400 ; Refresh >> 7200 ; Retry >> 3600000 ; Expire >> 86400 ) ; Minimum TTL >> thaumatocracy.com. 14400 IN NS ns.itkinetix.com. >> thaumatocracy.com. 14400 IN NS ns2.itkinetix.com. >> thaumatocracy.com. 14400 IN MX 0 thaumatocracy.com. >> thaumatocracy.com. 14400 IN A 67.52.151.98 >> endorphins.thaumatocracy.com. 14400 IN A 10.0.0.71 >> home.thaumatocracy.com. 14400 IN A 67.52.151.102 >> localhost.thaumatocracy.com. 14400 IN A 127.0.0.1 >> mail.thaumatocracy.com. 14400 IN CNAME thaumatocracy.com. >> www.thaumatocracy.com. 14400 IN CNAME thaumatocracy.com. >> tumble.thaumatocracy.com. 14400 IN A 72.32.231.8 >> ftp.thaumatocracy.com. 14400 IN A 67.52.151.98 >> >> >> Chris Penn >> >> On Tue, Feb 9, 2010 at 12:23 PM, Dino K <socalli...@cloudcomp.info> wrote: >>> Unbelievable... I will look into this also and correspond any findings via >>> private e-mail first. >>> >>> >>> On Tue, Feb 9, 2010 at 9:04 AM, David Kaiser <dkai...@cdk.com> wrote: >>>> Last night I submitted the attached e-mail to the abuse department at >>>> rr.com as well as to federal authorities. I believe the attached e-mail >>>> and the corresponding web page (http://socallinux.org/attack/log.html) >>>> are self-explanatory. >>>> >>>> Additionally, I need to point out the following: >>>> >>>> * we are NOT cool with actions like this being run against our server. >>>> this incident is NOT considered friendly. it is not any type of >>>> research. nobody was invited to run an attack on our server. (just >>>> making that clear) >>>> >>>> * the server host for socallinux.org is being actively monitored >>>> >>>> * we have taken steps to eliminate or reduce any damage by any attempted >>>> hacks (having current backups, etc.) should anything ever be defaced, etc. >>>> >>>> * we take these offenses very seriously and are working with law >>>> enforcement to report incidents >>>> >>>> >>>> Finally, we know the IP address (67.52.151.102) is in a netblock which >>>> we can assume belongs to dan tentler. the netblock is listed as follows: >>>> network:ID:NETBLK-ISRC-67.52.128.0/19 >>>> network:Auth-Area:67.52.151.96/29 >>>> network:Network-Name:IT-KINETIX-67.52.151.96 >>>> network:IP-Network:67.52.151.96/29 >>>> network:IP-Network-Block:67.52.151.96 - 67.52.151.103 >>>> network:Organization;I:IT-KINETIX >>>> network:Tech-Contact;I:ipadd...@rr.com >>>> network:Admin-Contact;I:IPADD-ARIN >>>> network:AbuseEmail:d...@itkinetix.com >>>> >>>> if you do an ARIN whois search on those 8 IP addresses (67.52.151.96 >>>> through 67.52.151.103) you fill find they are all a part of the same >>>> assigned netblock. (try the following command to search ARIN records: >>>> whois -h whois.arin.net 67.52.151.102 ) >>>> >>>> other domains hosted in the netblock include: atenlabs.com and >>>> thaumatocracy.com, which are known to be under dan's control. (you can >>>> look up their IP#'s yourself.) >>>> >>>> Having said that... we don't have any concrete evidence or proof who >>>> actually was behind this attack. (It is theoretically possible that >>>> someone could have gained control of a host inside that network and done >>>> this without Dan's permission.) I am not making an accusation that Dan >>>> himself did this. In my reporting of the incident to the authorities I >>>> am only providing the information as I have here (providing log files >>>> and analysis through domain registration records, etc.) >>>> >>>> I'm being very clear here and only stating non-opinion facts because >>>> sometimes people confuse opinions with accusations. I would advise >>>> anyone to also stay clear of opinions and anything that even could be >>>> construed as an accusation of wrongdoing against any individual if they >>>> reply to this message. >>>> >>>> I'm posting this today so everyone on the list can analyze the log >>>> files, take a look at them and you can start to understand how nmap >>>> works. If you look at the linked access.log file, you can also see the >>>> specific mailman CGI URL's that were being targeted for privilege >>>> escalation. It's an opportunity to learn a bit about what a public >>>> server faces from time to time. >>>> >>>> If you have any questions, let me know. >>>> >>>> DK >>>> >>>> >>>> >>>> ---Begin Forwarded Message--- >>>> >>>> To: RR.COM abuse department <ab...@rr.com>, >>>> RR.COM Security department <secur...@rr.com> >>>> Cc: IT-KINETIX abuse department <d...@itkinetix.com> >>>> Subject: Malicous activity from IP address 67.52.151.102 (itkinetix.com) >>>> >>>> For the past few days an Internet host that I help maintain has been the >>>> recipient of a large amount of malicous activity from an IP number >>>> within your network. This activity has included wide-range port >>>> scanning, probing for vulnerable services, attempts to obtain secured >>>> and private information, and attempts to gain privilege or gain elevated >>>> privilege from the system. >>>> >>>> The host in your network has an IP address of: 67.52.151.102 with a >>>> reverse DNS record pointing to ns2.itkinetix.com. I have Cc:d the abuse >>>> contact, d...@itkinetix.com, in this complaint, based on that e-mail >>>> being listed as the abuse contact in the ARIN record for itkinetix.com >>>> >>>> >>>> Please see the specific log content and linked files at >>>> http://socallinux.org/attack/log.html >>>> >>>> >>>> While it can be argued, in some jurisdictions, that port scanning is not >>>> illegal, it can be clearly seen that in this case, a particular scanner >>>> is making multiple attempts to discover available and potentially >>>> vulnerable services on the system. Combined with the attempts to obtain >>>> user account information (trying to force a CGI to return the contents >>>> of /etc/passwd) as well as trying to force a CGI to edit stored HTML >>>> content, we believe these actions are intentional and done with malicous >>>> intent. >>>> >>>> Based on the RoadRunner "System and Network Security" Policy listed at: >>>> http://help.rr.com/HMSFaqs/e_sys_net_security.aspx?Topic=Policies >>>> >>>> (specifically the first bullet point which reads "Unauthorized access to >>>> or use of data, systems or networks, including any attempt to probe, >>>> scan or test the vulnerability of a system or network or to breach >>>> security or authentication measures without express authorization of the >>>> owner of the system or network." ...we are sure this activity is a >>>> direct violation of RoadRunner's policies, and definitively constitutes >>>> unauthorized activity. >>>> >>>> We are appealing to RoadRunner to provide an immediate and thorough >>>> removal of the offending host and to put in place a solution which >>>> prevents this offense from affecting our server again. >>>> >>>> Please be advised that we have also filed a complaint with the Internet >>>> Crime Complaint Center (www.ic3.gov) and this incident has been assigned >>>> Complaint ID: I1002090519458152 You may be contacted by a >>>> representative of one of the IC3 agencies for clarification of details. >>>> >>>> We expect a response from rr.com within 24 hours with a complete list of >>>> actions taken to meet this request. >>>> >>>> Upon request, we can provide the complete firewall logs detailing the >>>> over 16000 TCP connection attempts (made from this one host) in 4 >>>> different port scanning sessions. >>>> >>>> Thank you for your attention to this matter. >>>> >>>> David Kaiser <dkai...@cdk.com> >>>> Representing SocalLinux.org system administrators >>>> >>>> _______________________________________________ >>>> LinuxUsers mailing list >>>> LinuxUsers@socallinux.org >>>> http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers >>> >>> _______________________________________________ >>> LinuxUsers mailing list >>> LinuxUsers@socallinux.org >>> http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers >>> >>> >> >> >> > > _______________________________________________ > LinuxUsers mailing list > LinuxUsers@socallinux.org > http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers > _______________________________________________ LinuxUsers mailing list LinuxUsers@socallinux.org http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers