Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-05-01 Thread --[ UxBoD ]--
- Original Message -
 Randy-
 
  On Wed, Apr 21, 2010 at 5:33 PM, Steve Murphy m...@parsetree.com
  wrote:
  Assuming that every such spamming/hacking/attack site is funded on
  a stolen identity/CC number, it will soon sink into Amazon that
  they are
  getting a bad rep, and losing money on such problems, as all such
  charges are reversed when the identity theft is discovered... How
  they overcome
  the problem, should be a tribute to the marvelous power of human
  ingenuity.
 
  Interesting point about the stolen CC numbers. If that is true, then
  they will be forced to investigate for their own internal damage
  control.
 
 You are nothing if not persistent, an excellent quality in a case like
 this. By now I'm sure Amazon execs are
 wondering who is this Randulo guy, hehe.
 

Slammed again last night by a A-WS server; see if anything comes back from 
their abuse department!

-- 
Thanks, Phil

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-05-01 Thread Randy R
On Sat, May 1, 2010 at 4:49 PM, --[ UxBoD ]-- ux...@splatnix.net wrote:
 Slammed again last night by a A-WS server; see if anything comes back from 
 their abuse  department!

FWIW, I chose another provider for our most recent customer who needed
cloud hosting, only because of the EC2 flood Attacks and Amazon's weak
defense and lack of cooperation. All they have done so far is PR spin.
We need them to actually do something. In the meantime, they've lost
my business and I hope others are voting with their feet.

I also had an interesting discussion with one of the people behind
http://projecthoneypot.org who said they'd be interested in working
with us on devising a lookup scheme like the one they've been using
for comment spammers, etc. I can tell you from first hand experience
that their DNSBL has saved me hours and avoids 95% of the comment spam
we were getting before I wrote a simple function to access PHP's
database.

As soon as I return from China, I will get back in touch with them and
we should set up a meeting with everyone who is concerned by this EC2
abuse thing. I think we can do some good work together;

An interesting sidenote to Projet HoneyPot is that the site is down
because of a disk failure. But the interesting note is that it is a
SSD! So much for no moving parts being more reliable!

/r

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-21 Thread Randy R
Amazon is pretty clever! Ever seen V on TV?

Amazon talks a pretty good game out of one side of their PR
mouthpiece, but as a few of you note above, they abuse words like
quickly and temper everything with when Amazon determines.

This is a PR damage control statement. It means they are hearing the
shots fired by irate server operators/owners and I say you should keep
that pressure on until you actually see them acting QUICKLY and not
dicking you around, asking you to resubmit reports, etc.

I know some of you whose servers have been attacked. I know that you
are extremely capable network admins, programmers, VoIP engineers,
etc, which means your reports are technically at the same level or
higher than the people at Amazon that receive them.

Conclusion: Amazon is still dancing, start shooting higher then their feet.

/r

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-21 Thread Gordon Henderson
On Tue, 20 Apr 2010, Frank Bulk wrote:

 Please take note of their posting:
   https://aws.amazon.com/security/
 which discusses the issue and what they're doing to improve response.

And is anyone on the list worthy of being considered a significant SIP 
provider to be honoured with the privilege of working with them?

Gordon

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-21 Thread Fred Posner
On Apr 21, 2010, at 4:50 AM, Gordon Henderson wrote:

 On Tue, 20 Apr 2010, Frank Bulk wrote:
 
 Please take note of their posting:
  https://aws.amazon.com/security/
 which discusses the issue and what they're doing to improve response.
 
 And is anyone on the list worthy of being considered a significant SIP 
 provider to be honoured with the privilege of working with them?
 
 Gordon
 

None of the carriers I deal with have been contacted. Of course, them only 
contacting significant providers... does that mean it's ok if the attacks 
happen to non-significant providers or end-points?

---fred
http://qxork.com






-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-21 Thread Randy R
On Wed, Apr 21, 2010 at 2:55 PM, Fred Posner f...@teamforrest.com wrote:
 On Apr 21, 2010, at 4:50 AM, Gordon Henderson wrote:

 On Tue, 20 Apr 2010, Frank Bulk wrote:

 Please take note of their posting:
      https://aws.amazon.com/security/
 which discusses the issue and what they're doing to improve response.

 And is anyone on the list worthy of being considered a significant SIP
 provider to be honoured with the privilege of working with them?

 Gordon


 None of the carriers I deal with have been contacted. Of course, them only 
 contacting significant providers... does that mean it's ok if the attacks 
 happen to non-significant providers or end-points?

 ---fred
 http://qxork.com

If it got to their BS/PR page/blog it means they're hearing about
complaints on the net as well as people like you submitting. Everyone
please keep posting where you can and sooner or later, someone big
will pick up the story.

Funny, I'd think the most worthy people to comment on this issue are
on this list. That's the feedback they should be looking for and
working on at Amazon EC2.

/r

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-21 Thread Stuart Sheldon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Randy R wrote:
 On Wed, Apr 21, 2010 at 2:55 PM, Fred Posner f...@teamforrest.com
 wrote:
 On Apr 21, 2010, at 4:50 AM, Gordon Henderson wrote:
 
 On Tue, 20 Apr 2010, Frank Bulk wrote:
 
 Please take note of their posting: 
 https://aws.amazon.com/security/ which discusses the issue and
 what they're doing to improve response.
 And is anyone on the list worthy of being considered a
 significant SIP provider to be honoured with the privilege of
 working with them?
 
 Gordon
 
 None of the carriers I deal with have been contacted. Of course,
 them only contacting significant providers... does that mean it's
 ok if the attacks happen to non-significant providers or
 end-points?
 
 ---fred http://qxork.com
 
 If it got to their BS/PR page/blog it means they're hearing about 
 complaints on the net as well as people like you submitting. Everyone
  please keep posting where you can and sooner or later, someone big 
 will pick up the story.
 
 Funny, I'd think the most worthy people to comment on this issue
 are on this list. That's the feedback they should be looking for and 
 working on at Amazon EC2.
 
 /r
 

We might me reading their PR wrong... Maybe there were large SIP
providers that were compromised due to this attack... Maybe they are
keeping that quiet at the request of those providers... It could also be
that the aliens in hiding in Colorado are behind the whole thing! ... Oh
no! I've said too much!!! LOL...

It could actually be the case that this whole issue went beyond what we
are seeing, and they are trying to protect one of their Whale customers...

Needless to say, what about the SSH brute force attacks that originate
from their network? What about the SPAM that flows like a fountain from
their net blocks?

This was nothing more then PR hype...

Stu


- --
For six long years I've been in trouble, no pleasure here on earth
I found. For in this world I'm bound to ramble, I have no friends
to help me now.
   -- The Soggy Bottom Boys - I am a man of constant sorrow
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iQIcBAEBCAAGBQJLzxhvAAoJEFKVLITDJSGS7boP/A00AIG02wKVejBPM+EZnqwE
zc12a0RwjbS9j3LjxSbutfDUBb5LphJpknVHy1HF7pPj5Dm3LNooVhSUq8UU+vO+
iSGIGMDVij943dGKo2bInhhZmc9rCAyBmmrRn/AP/YvQ3ZxrcJPyirOQOeEpTMee
m1ctlVsP2/O5M8Igv8Hm+eE4ZlDDsTSSDr3M0W80y1wMzUD/XLtEsOWexT3wVRUY
WuErhbc7xZcySgEy7GsH3+O3BFhuV2JYwr0bkF+qVcdDbDL13aiBEqoJqWDOqhJI
dcgY1JYra8wUU5aum/1awH+psxpx0WTsIUr34yDDUoRRCubmVjeDL4ZBVeT4O8E8
b2UvRalGhtFl8zm8FoaBCWmG5fNoorNasoyTnkyANsAnvdW72T9Wn5yWKAwVaYZe
VlX7S9bcpBV880jgm6hV7rrDFizyy4Lo96f1eoSlwNy8e4LI/bp/dn5f54RBDj5k
fpckpYFZFz0kAOwnAAlwKOmHgUr/jMqMMFL6ZyF/7fl7phwVKHm1DwspF0soLJkF
GEAztCBRG02++eePNCpJWk/WdNzGSA6btveOSWbYy+BkZ8UTmr9IKXp2lOsBeXJa
xrCv5vgB0s9TAd/QPoBRY8XLEp4BYEL9+cDzpclbMpi5ybVwviAGjjm9gNnx0Fd7
/8HHyve0W1uNIVIsHzDz
=N7lH
-END PGP SIGNATURE-

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-21 Thread Steve Murphy
On Wed, Apr 21, 2010 at 9:23 AM, Stuart Sheldon s...@actusa.net wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA256

 Randy R wrote:
  On Wed, Apr 21, 2010 at 2:55 PM, Fred Posner f...@teamforrest.com
  wrote:
  On Apr 21, 2010, at 4:50 AM, Gordon Henderson wrote:
 
  On Tue, 20 Apr 2010, Frank Bulk wrote:
 
  Please take note of their posting:
  https://aws.amazon.com/security/ which discusses the issue and
  what they're doing to improve response.
  And is anyone on the list worthy of being considered a
  significant SIP provider to be honoured with the privilege of
  working with them?
 
  Gordon
 
  None of the carriers I deal with have been contacted. Of course,
  them only contacting significant providers... does that mean it's
  ok if the attacks happen to non-significant providers or
  end-points?
 
  ---fred http://qxork.com
 
  If it got to their BS/PR page/blog it means they're hearing about
  complaints on the net as well as people like you submitting. Everyone
   please keep posting where you can and sooner or later, someone big
  will pick up the story.
 
  Funny, I'd think the most worthy people to comment on this issue
  are on this list. That's the feedback they should be looking for and
  working on at Amazon EC2.
 
  /r
 

 We might me reading their PR wrong... Maybe there were large SIP
 providers that were compromised due to this attack... Maybe they are
 keeping that quiet at the request of those providers... It could also be
 that the aliens in hiding in Colorado are behind the whole thing! ... Oh
 no! I've said too much!!! LOL...

 It could actually be the case that this whole issue went beyond what we
 are seeing, and they are trying to protect one of their Whale customers...

 Needless to say, what about the SSH brute force attacks that originate
 from their network? What about the SPAM that flows like a fountain from
 their net blocks?

 This was nothing more then PR hype...

 Stu


Assuming that every such spamming/hacking/attack site is funded on a
stolen identity/CC number, it will soon sink into Amazon that they are
getting a bad rep, and losing money on such problems, as all such charges
are reversed when the identity theft is discovered... How they overcome
the problem, should be a tribute to the marvelous power of human ingenuity.

murf

-- 
Steve Murphy
ParseTree Corp
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-21 Thread Randy R
On Wed, Apr 21, 2010 at 5:33 PM, Steve Murphy m...@parsetree.com wrote:
 Assuming that every such spamming/hacking/attack site is funded on a
 stolen identity/CC number, it will soon sink into Amazon that they are
 getting a bad rep, and losing money on such problems, as all such charges
 are reversed when the identity theft is discovered... How they overcome
 the problem, should be a tribute to the marvelous power of human ingenuity.

Interesting point about the stolen CC numbers. If that is true, then
they will be forced to investigate for their own internal damage
control.

/r

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-21 Thread Jeff Brower
Randy-

 On Wed, Apr 21, 2010 at 5:33 PM, Steve Murphy m...@parsetree.com wrote:
 Assuming that every such spamming/hacking/attack site is funded on a
 stolen identity/CC number, it will soon sink into Amazon that they are
 getting a bad rep, and losing money on such problems, as all such charges
 are reversed when the identity theft is discovered... How they overcome
 the problem, should be a tribute to the marvelous power of human ingenuity.

 Interesting point about the stolen CC numbers. If that is true, then
 they will be forced to investigate for their own internal damage
 control.

You are nothing if not persistent, an excellent quality in a case like this.  
By now I'm sure Amazon execs are
wondering who is this Randulo guy, hehe.

-Jeff


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-20 Thread Frank Bulk
Please take note of their posting:
https://aws.amazon.com/security/
which discusses the issue and what they're doing to improve response.

Frank

-Original Message-
From: asterisk-users-boun...@lists.digium.com
[mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Fred Posner
Sent: Tuesday, April 13, 2010 3:41 PM
To: Asterisk Users Mailing List - Non-Commercial Discussion
Subject: Re: [asterisk-users] Being attacked by an Amazon EC2 ...

On Apr 13, 2010, at 4:22 PM, Randy R wrote:

 On Tue, Apr 13, 2010 at 8:25 PM, Steve Murphy m...@parsetree.com wrote:
 Hmmm. It would seem that it would be to Amazon's advantage to jump on
this
 problem,
 
 I am pushing for this, please everyone who is suffering from this
 problem, submit it or write to complain to Amazon and post the message
 publicly wherever you can in a civilized, even lucid message to them.
 If you do it they will take notice. They need to see this as a problem
 in their space and take reasonable steps to either make it harder to
 abuse their service and/or easier to report the abuse, which they must
 then act upon.  The thread here is an interesting discussion, but it
 can't compare to actual action they might take if your complaints
 reach them. They will need to act, but only if you force them to take
 notice.
 
 I believe Amazon has a chance to distinguish themselves from ISP who
 allow spammers to do mass mailings without any real challenge. They
 will act if you continue putting the message out there.
 
 /r
 

The only person I've gotten to respond to me is Kay Kinton from Amazon's
Public Relations. Although she responded, she will not take a phone call or
discuss the issue over the phone. She gave me two statements so far, which I
will be posting on VoIPTechChat.com (one's there already).

Statement 1:

Hello Fred and thank you for contacting us.  Over the weekend, we received a
report of a suspicious account and began an investigation.  Our normal
process is to connect the two involved parties to give them an opportunity
to talk in case the abuse is not malicious but is simply heavy traffic from
a legitimate customer.  If that is not successful, we then move to isolate
the traffic from the abusing party.  Normally this process works quite well
for situations our customers have encountered, however this incident has
highlighted the need for an escalation process to address potentially
malicious attacks more quickly. Additionally, we are working on quickly
putting better protections and processes in place to better guard against
unwanted SIP traffic.  We take the security of our customers and our quality
of service very seriously, and will  continue to work to improve our
processes and services for customers.

/end statement 1

This was of course was while attacks were continuing so I asked for a
discussion and sent her several questions when she told me what else can I
tell you.

Today I received statement 2:

Hello Fred. We believe that we've identified and shut down the illegal
activity and are closing the loop with customers.  We'd certainly be
interested in hearing of the cases you refer to below so we can follow up.

/end statement 2.

So.. since she's interested... please let her know how they did not respond
to your complaints, the attacks, and well, any of the concerns you have to
which she should follow up:

Kay Kinton
kin...@amazon.com
Public Relations Manager
Amazon Web Services
Phone:  206-266-8387

---fred
http://qxork.com


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-20 Thread Fred Posner
On Apr 20, 2010, at 6:18 PM, Frank Bulk wrote:

 Please take note of their posting:
   https://aws.amazon.com/security/
 which discusses the issue and what they're doing to improve response.
 
 Frank
 

If only they wrote the truth...

When we find misuse, we take action quickly and shut it down.

If quickly means letting it go on for weeks, then they definitely handled it 
quickly.




---fred
http://qxork.com


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-20 Thread Frank Bulk
I agree, our quickly and Amazon's quickly are two different things.
Maybe it was quickly for them.  And note that they say when *we* find
misuse.  Even though a customer may have identified it, their AWS abuse
(team?) may not run a 24x7 operation and further delay things.

Frank

-Original Message-
From: asterisk-users-boun...@lists.digium.com
[mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Fred Posner
Sent: Tuesday, April 20, 2010 6:47 PM
To: Asterisk Users Mailing List - Non-Commercial Discussion
Subject: Re: [asterisk-users] Being attacked by an Amazon EC2 ...

On Apr 20, 2010, at 6:18 PM, Frank Bulk wrote:

 Please take note of their posting:
   https://aws.amazon.com/security/
 which discusses the issue and what they're doing to improve response.
 
 Frank
 

If only they wrote the truth...

When we find misuse, we take action quickly and shut it down.

If quickly means letting it go on for weeks, then they definitely handled it
quickly.

---fred
http://qxork.com


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-20 Thread Chris Owen

On Apr 20, 2010, at 5:18 PM, Frank Bulk wrote:

 Please take note of their posting:
   https://aws.amazon.com/security/
 which discusses the issue and what they're doing to improve response.

This is an incredibly lame post on their part.   They go out of their way to 
point out there was nothing unique about this attack that made it require that 
it come from EC2.   However, that isn't true.   Had this attack come from 
anywhere else it would have been shut down _days_ before it was on EC2.

Chris

-
Chris Owen - Garden City (620) 275-1900 -  Lottery (noun):
President  - Wichita (316) 858-3000 -A stupidity tax
Hubris Communications Inc  www.hubris.net
-





-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2

2010-04-13 Thread Randy R
 I worked with Project Honeypot guys for a while, they are more than
 willing to assist, as they already have the backend work done for a
 clearing house identifying hackers.  The biggest issue we had a year
 ago was to create the mechanism in asterisk to push valid log messages
 out to the database and then determine what to do with that data?

Because I run a lot of forums and blogs, I use Project Honeypot,
report to them and have lent them a few honeypot MX and pages.

 I tried to bridge the gap between a few Asterisk developers and the
 Honeypot developers, ultimately the project stalled and I got busy
 with other matters.  If anyone here would like to pick up the torch
 and move this along, I can certainly provide info on how far along we
 got and contact info for the parties involved.

Project Honeypot seems pretty overworked/overstretched already, but if
you're able to communicate whith them that's excellent, they are doing
a great job with their DB, it saves me a lot of time.

 Please contact me if you have time to work on this and are interested.
  I'm sure the Project Honeypot guys will be willing to pick this
 project back up and work on it.

I can't contribute code, but I can help spread the word. I also still
believe that Amazon needs to put resources to work on the problem. The
cloud is too easy to hide in for what are obviously fraudulent
operations.

We will certainly be talking about this on the VoIP Users Conference
in the next weeks. We should schedule it as a topic, possibly for the
April 30th. Would you be available for that JR? (12 Noon EDT)

/r

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Randy R
On Mon, Apr 12, 2010 at 7:17 PM, Darrick Hartman
dhart...@djhsolutions.com wrote:
 That only addresses EC2 (and assumes that Amazon has any interest in
 protecting their reputation).  What about attacks that come from other
 locations?  Granted it's pretty easy to buy time on an EC2 server so
 this may be the primary source for a period of time.

With the growth of the cloud offerings, this problem will likely grow,
so  yes, a generic solution is needed. What I want to see though, and
no provder has done much if anything about it, is REPORTING and
INVESTIGATION. It is easy to use a script to report and submit, we can
all do that, even I could (if I had a box running and needed to). The
hard part is them having their tech/sys people actually look at the
network and see, Oh, ya, there's some shit happening that on that
instance...

If Amazon's form submit didn't even work, that's a really bad
reflection on their brand in a lot of ways, including tech competence.
If that is know to geeks like us, it won't hurt them which is why,
like a broken record, I keep saying: put your Amazon experience out to
the public. When it starts being mentioned in Wired, Storm Cloud or
something, THEN Amazon will have to do something.

I do not believe Amazon is taking reasonable measures now in doing
their job, and that they should be working towards that goal,
reasonable measures as opposed to NO measures.

/r

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Alyed
Think we need some solution WITHIN the Asterisk core. Roderick A. suggested
something that looks nice using iptables, some others have pointed out using
RBL or fail2ban, but the best would be to have some generic solution not
dependant on third party programs.

I'm not aware of the asterisk.dev list but maybe someone can tell if they
can help us here?

Alyed


2010/4/13 Randy R randulo2...@gmail.com

 On Mon, Apr 12, 2010 at 7:17 PM, Darrick Hartman
 dhart...@djhsolutions.com wrote:
  That only addresses EC2 (and assumes that Amazon has any interest in
  protecting their reputation).  What about attacks that come from other
  locations?  Granted it's pretty easy to buy time on an EC2 server so
  this may be the primary source for a period of time.

 With the growth of the cloud offerings, this problem will likely grow,
 so  yes, a generic solution is needed. What I want to see though, and
 no provder has done much if anything about it, is REPORTING and
 INVESTIGATION. It is easy to use a script to report and submit, we can
 all do that, even I could (if I had a box running and needed to). The
 hard part is them having their tech/sys people actually look at the
 network and see, Oh, ya, there's some shit happening that on that
 instance...

 If Amazon's form submit didn't even work, that's a really bad
 reflection on their brand in a lot of ways, including tech competence.
 If that is know to geeks like us, it won't hurt them which is why,
 like a broken record, I keep saying: put your Amazon experience out to
 the public. When it starts being mentioned in Wired, Storm Cloud or
 something, THEN Amazon will have to do something.

 I do not believe Amazon is taking reasonable measures now in doing
 their job, and that they should be working towards that goal,
 reasonable measures as opposed to NO measures.

 /r

 --
 _
 -- Bandwidth and Colocation Provided by http://www.api-digital.com --
 New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

 asterisk-users mailing list
 To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Tzafrir Cohen
On Tue, Apr 13, 2010 at 08:27:11AM +0200, Randy R wrote:
 On Mon, Apr 12, 2010 at 7:17 PM, Darrick Hartman
 dhart...@djhsolutions.com wrote:
  That only addresses EC2 (and assumes that Amazon has any interest in
  protecting their reputation).  What about attacks that come from other
  locations?  Granted it's pretty easy to buy time on an EC2 server so
  this may be the primary source for a period of time.
 
 With the growth of the cloud offerings, this problem will likely grow,
 so  yes, a generic solution is needed. What I want to see though, and
 no provder has done much if anything about it, is REPORTING and
 INVESTIGATION. It is easy to use a script to report and submit, we can
 all do that, even I could (if I had a box running and needed to). The
 hard part is them having their tech/sys people actually look at the
 network and see, Oh, ya, there's some shit happening that on that
 instance...

But this potentially moved DoS attacks from one place to another.
Especially given that the source of a UDP packet is easy to forge.


(And yes, in this case the attack was not intended to be a simple DoS)
-- 
   Tzafrir Cohen
icq#16849755  jabber:tzafrir.co...@xorcom.com
+972-50-7952406   mailto:tzafrir.co...@xorcom.com
http://www.xorcom.com  iax:gu...@local.xorcom.com/tzafrir

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2

2010-04-13 Thread Tzafrir Cohen
On Mon, Apr 12, 2010 at 04:58:42PM -0500, JR Richardson wrote:
  Perhaps if there was a Asterisk RBL we could all contribute to; for
  which we could then hook into and drop any connection where a
  source IP is listed ? -- Thanks, Phil
 
 
  I love the idea of a RBL... count me in for contributing.
 
  Especially considering the ridiculous response I received from
  Amazon. (Basically told me to submit host, destination, port, proto,
  and log... which of course was already included in the original
  complaint)
 
  I don't think anyone else brought up the Spamhaus DROP project.  It's a
  blacklist of IP addresses and address ranges which are known to ONLY be
  used for malicious purposes.
 
  http://www.spamhaus.org/drop/

This is for really bad spammers. In our case it would be used to block
Amazon AWS in the (completely unlikely!) case that they would do nothing
about those cases.

 
  We could establish something similar to that for VOIP attacks.  It may
  not be exactly a trivial system to maintain such a list. (removing IP's
  after X amount of time, disputing false claims etc).  Maybe someone
  could contact spamhaus to create a list for VOIP since they seem to have
  a nice system in place?
 
 Hi All, good discussion, similar to ones we had a year or so ago.  The
 RBL concept is valid, at least to get a repository going that list
 malicious activity specific to SIP attacks.
 n
 I worked with Project Honeypot guys for a while, they are more than
 willing to assist, as they already have the backend work done for a
 clearing house identifying hackers.  The biggest issue we had a year
 ago was to create the mechanism in asterisk to push valid log messages
 out to the database and then determine what to do with that data?
 
 I tried to bridge the gap between a few Asterisk developers and the
 Honeypot developers, ultimately the project stalled and I got busy
 with other matters.  If anyone here would like to pick up the torch
 and move this along, I can certainly provide info on how far along we
 got and contact info for the parties involved.
 
 Please contact me if you have time to work on this and are interested.
  I'm sure the Project Honeypot guys will be willing to pick this
 project back up and work on it.

I've been bitten too many times by over-jelous anti-spam black lists.
It's easy to get in. More difficult to be removed. And heck, I can
easily get set up a few servers in Amazon which will generate faked logs
of attacks from your server, if I want to shut your phone system for a
couple of days.

-- 
   Tzafrir Cohen
icq#16849755  jabber:tzafrir.co...@xorcom.com
+972-50-7952406   mailto:tzafrir.co...@xorcom.com
http://www.xorcom.com  iax:gu...@local.xorcom.com/tzafrir

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread --[ UxBoD ]--
- Original Message -
 Think we need some solution WITHIN the Asterisk core. Roderick A.
 suggested something that looks nice using iptables, some others have
 pointed out using RBL or fail2ban, but the best would be to have some
 generic solution not dependant on third party programs.
 
 I'm not aware of the asterisk.dev list but maybe someone can tell if
 they can help us here?
 
 Alyed
 
 
 
 2010/4/13 Randy R  randulo2...@gmail.com 
 
 
 
 On Mon, Apr 12, 2010 at 7:17 PM, Darrick Hartman
  dhart...@djhsolutions.com  wrote:
  That only addresses EC2 (and assumes that Amazon has any interest in
  protecting their reputation). What about attacks that come from
  other locations? Granted it's pretty easy to buy time on an EC2
  server so
  this may be the primary source for a period of time.
 
 With the growth of the cloud offerings, this problem will likely grow,
 so yes, a generic solution is needed. What I want to see though, and
 no provder has done much if anything about it, is REPORTING and
 INVESTIGATION. It is easy to use a script to report and submit, we can
 all do that, even I could (if I had a box running and needed to). The
 hard part is them having their tech/sys people actually look at the
 network and see, Oh, ya, there's some shit happening that on that
 instance...
 
 If Amazon's form submit didn't even work, that's a really bad
 reflection on their brand in a lot of ways, including tech competence.
 If that is know to geeks like us, it won't hurt them which is why,
 like a broken record, I keep saying: put your Amazon experience out to
 the public. When it starts being mentioned in Wired, Storm Cloud or
 something, THEN Amazon will have to do something.
 
 I do not believe Amazon is taking reasonable measures now in doing
 their job, and that they should be working towards that goal,
 reasonable measures as opposed to NO measures.
 
 /r
 
 
 
 

DNS lookup capability appears to be required on a Asterisk installation and 
hence a DNSRBL would appear to be a good solution. A alternative, similar to 
the SaneSecurity AV sigs, would be to have a pool of rsync servers for 
downloading a list of known IPs.  Again this would require community 
contribution in both time and resources.  I would be happy to allocate some 
spare memory and CPU cycles and hopefully my employer would as-well.
-- 
Thanks, Phil

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Gordon Henderson
On Tue, 13 Apr 2010, Alyed wrote:

 Think we need some solution WITHIN the Asterisk core. Roderick A. suggested
 something that looks nice using iptables, some others have pointed out using
 RBL or fail2ban, but the best would be to have some generic solution not
 dependant on third party programs.

I'd strongly disagree with this. (And I was the OP of this thread and had 
my home/office network connection taken down due to it)

But then, I'm an old worldy Unix sysadmin and the philosophy of having a 
program do one thing well is still etched into my core...

http://en.wikipedia.org/wiki/Unix_philosophy

So get asterisk to do what it does well, then get something else that does 
what you need to do just as well - built-in to Linux are the iptables 
firewall rules. Use them! They are very effective and do work. (And you 
have a choice!)

The biggest issue I see is that people are installing Asterisk and other 
high-level applications on top of Linux (and other *nix'es) without the 
experience of sysadmin - then when something goes wrong they want the 
application to fix it rather than apply some basic and pretty fundamental 
sysadmin techniques to solve the issue.

And that means that even having permit= and deny= in sip.conf and 
iax.conf, etc. is too much. With proper OS level firewalling they're 
simply not needed and do nothing more than add another potential point of 
failure and add yet more code to maintain.

Gordon

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread --[ UxBoD ]--
- Original Message -
 On Tue, 13 Apr 2010, Alyed wrote:
 
  Think we need some solution WITHIN the Asterisk core. Roderick A.
  suggested something that looks nice using iptables, some others have
  pointed out using
  RBL or fail2ban, but the best would be to have some generic solution
  not dependant on third party programs.
 
 I'd strongly disagree with this. (And I was the OP of this thread and
 had my home/office network connection taken down due to it)
 
 But then, I'm an old worldy Unix sysadmin and the philosophy of having
 a program do one thing well is still etched into my core...
 
 http://en.wikipedia.org/wiki/Unix_philosophy
 
 So get asterisk to do what it does well, then get something else that
 does what you need to do just as well - built-in to Linux are the
 iptables firewall rules. Use them! They are very effective and do
 work. (And you
 have a choice!)
 
 The biggest issue I see is that people are installing Asterisk and
 other high-level applications on top of Linux (and other *nix'es)
 without the
 experience of sysadmin - then when something goes wrong they want
 the application to fix it rather than apply some basic and pretty
 fundamental sysadmin techniques to solve the issue.
 
 And that means that even having permit= and deny= in sip.conf and
 iax.conf, etc. is too much. With proper OS level firewalling they're
 simply not needed and do nothing more than add another potential point
 of failure and add yet more code to maintain.
 
 Gordon
 

Gordon,

Completely agree with what you are saying though I believe the proposal of some 
sort of shared IP list is a valid one.  If you had not brought this to the 
attention of the list then this discussion would have not taken place.  I am 
guilty in that when a EC2 server attempted to break into my PBX I did not share 
it with the list.  We, large assumption, are all at some point subjected to 
probing attacks against our Asterisk deployments and I feel it would be great 
if there was some mechanism where we were able to share those hackers IPs for 
blocking by one means or another.
-- 
Thanks, Phil

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Norbert Zawodsky
Am 13.04.2010 10:47, schrieb Gordon Henderson:
 I'd strongly disagree with this. (And I was the OP of this thread and had
 my home/office network connection taken down due to it)

 But then, I'm an old worldy Unix sysadmin and the philosophy of having a 
 program do one thing well is still etched into my core...

 http://en.wikipedia.org/wiki/Unix_philosophy

 So get asterisk to do what it does well, then get something else that does 
 what you need to do just as well - built-in to Linux are the iptables 
 firewall rules. Use them! They are very effective and do work. (And you 
 have a choice!)

 The biggest issue I see is that people are installing Asterisk and other 
 high-level applications on top of Linux (and other *nix'es) without the 
 experience of sysadmin - then when something goes wrong they want the 
 application to fix it rather than apply some basic and pretty fundamental 
 sysadmin techniques to solve the issue.

 And that means that even having permit= and deny= in sip.conf and 
 iax.conf, etc. is too much. With proper OS level firewalling they're 
 simply not needed and do nothing more than add another potential point of 
 failure and add yet more code to maintain.

 Gordon

   
I definitely do to agree with Gordon!

If you have to get your car over a river, try to find a bridge or ferry
instead of trying to teach the car swimming

O.k., maybe this was a bit polemic. But in some way, it reminds me of
Linux. What I really love ist the very high flexibility.
And I definitely can see Gordon's point, not adding functionality to
programs which somehow doesn't belong there.

My thought is: It's very easy to write a program/script which connects
to any random IP:port adress and sends packets there. Regardless if the
remote side is responding or not.
This way you can easily eat up the remote side's bandwith and/or data
volume limit. And there's nothing the remote side can do against it
except pulling the plug.

If someone is sending millions of registers triyng to find an entry into
a phone server, the problem is related to asterisk.
But as soon as a firewall can block that, (or even as long as asterisk's
security is strong enough to not let them in), the issue is NOT related
to asterisk any more. From that moment on it is reduced to a bandwith
eat-up problem and belongs to the area of network administration.

This moves into the direction of an academic discussion titled what can
I do if someone else eats up my bandwith/data-volume-limit? 

My 2 cents..

BTW, the good news: had no attack here within the last 48 hours.
I implemented the iptables rules to drop packets from various adress
ranges. But log them first. I'd like to see if the bot is continuing if
it doen't get any reponses or if it gives up. But no attack so far

Norbert

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Hans Witvliet
On Tue, 2010-04-13 at 09:47 +0100, Gordon Henderson wrote:
 On Tue, 13 Apr 2010, Alyed wrote:
 
  Think we need some solution WITHIN the Asterisk core. Roderick A. suggested
  something that looks nice using iptables, some others have pointed out using
  RBL or fail2ban, but the best would be to have some generic solution not
  dependant on third party programs.
 
 I'd strongly disagree with this. (And I was the OP of this thread and had 
 my home/office network connection taken down due to it)
 
 But then, I'm an old worldy Unix sysadmin and the philosophy of having a 
 program do one thing well is still etched into my core...
 
 http://en.wikipedia.org/wiki/Unix_philosophy
 
 So get asterisk to do what it does well, then get something else that does 
 what you need to do just as well - built-in to Linux are the iptables 
 firewall rules. Use them! They are very effective and do work. (And you 
 have a choice!)

I'll agree with you here.
Any aditional security within * is fine, but if someone is simply
drowning your bandwith, action must be taken at a lower level.
Otherwise you endup re-inventing the wheel for D.o.s. attackes for voip,
mail, ssh, ldap, http, rsync, (or any other service you might be
running)

So a proper job for ip(6)tables, imho

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Philipp von Klitzing
Hi!

 Any aditional security within * is fine, but if someone is simply
 drowning your bandwith, action must be taken at a lower level.
 Otherwise you endup re-inventing the wheel for D.o.s. attackes for voip,
 mail, ssh, ldap, http, rsync, (or any other service you might be running)

However, I *still* think Asterisk should provide a delayreject option 
in sip.conf to greatly slow down answering request avanlanches. That will 
help to address the bandwidth issue if the attacker is configured to wait 
for a response before starting the next request.

Apart from that here are the most important messages: Use strong 
passwords in sip.conf, and use keys in iax.conf, and avoid usernames that 
can be guessed too easily (numbers from 100 to  and first names).

Philipp


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Fred Posner
On Apr 13, 2010, at 8:04 AM, Hans Witvliet wrote:

 On Tue, 2010-04-13 at 09:47 +0100, Gordon Henderson wrote:
 On Tue, 13 Apr 2010, Alyed wrote:
 
 Think we need some solution WITHIN the Asterisk core. Roderick A. suggested
 something that looks nice using iptables, some others have pointed out using
 RBL or fail2ban, but the best would be to have some generic solution not
 dependant on third party programs.
 
 I'd strongly disagree with this. (And I was the OP of this thread and had 
 my home/office network connection taken down due to it)
 
 But then, I'm an old worldy Unix sysadmin and the philosophy of having a 
 program do one thing well is still etched into my core...
 
 http://en.wikipedia.org/wiki/Unix_philosophy
 
 So get asterisk to do what it does well, then get something else that does 
 what you need to do just as well - built-in to Linux are the iptables 
 firewall rules. Use them! They are very effective and do work. (And you 
 have a choice!)
 
 I'll agree with you here.
 Any aditional security within * is fine, but if someone is simply
 drowning your bandwith, action must be taken at a lower level.
 Otherwise you endup re-inventing the wheel for D.o.s. attackes for voip,
 mail, ssh, ldap, http, rsync, (or any other service you might be
 running)
 
 So a proper job for ip(6)tables, imho
 
 -- 

+1 for outside of asterisk. I want something that blocks it before it gets to 
the Asterisk processes. I've posted a little script on Team Forrest for how I'm 
blocking the traffic (using a quick perl script, iptables, and cron). The 
script is at http://bit.ly/cDHlLq

---fred
http://qxork.com


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread bruce bruce
Speaking of all these attacks, are there any good web managed security
monitor tools for CentOS out there that can be installed on the system so
that it can give us a visual of let's multiple failed attempts against SSH
or HTTPd?

Something nice that is simple and doesn't eat a lot resources and spits out
everything on the screen?

Thanks,
Bruce

On Tue, Apr 13, 2010 at 9:51 AM, Fred Posner f...@teamforrest.com wrote:

 On Apr 13, 2010, at 8:04 AM, Hans Witvliet wrote:

  On Tue, 2010-04-13 at 09:47 +0100, Gordon Henderson wrote:
  On Tue, 13 Apr 2010, Alyed wrote:
 
  Think we need some solution WITHIN the Asterisk core. Roderick A.
 suggested
  something that looks nice using iptables, some others have pointed out
 using
  RBL or fail2ban, but the best would be to have some generic solution
 not
  dependant on third party programs.
 
  I'd strongly disagree with this. (And I was the OP of this thread and
 had
  my home/office network connection taken down due to it)
 
  But then, I'm an old worldy Unix sysadmin and the philosophy of having a
  program do one thing well is still etched into my core...
 
  http://en.wikipedia.org/wiki/Unix_philosophy
 
  So get asterisk to do what it does well, then get something else that
 does
  what you need to do just as well - built-in to Linux are the iptables
  firewall rules. Use them! They are very effective and do work. (And you
  have a choice!)
 
  I'll agree with you here.
  Any aditional security within * is fine, but if someone is simply
  drowning your bandwith, action must be taken at a lower level.
  Otherwise you endup re-inventing the wheel for D.o.s. attackes for voip,
  mail, ssh, ldap, http, rsync, (or any other service you might be
  running)
 
  So a proper job for ip(6)tables, imho
 
  --

 +1 for outside of asterisk. I want something that blocks it before it gets
 to the Asterisk processes. I've posted a little script on Team Forrest for
 how I'm blocking the traffic (using a quick perl script, iptables, and
 cron). The script is at http://bit.ly/cDHlLq

 ---fred
 http://qxork.com


 --
 _
 -- Bandwidth and Colocation Provided by http://www.api-digital.com --
 New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

 asterisk-users mailing list
 To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Hans Witvliet
On Tue, 2010-04-13 at 15:49 +0200, Philipp von Klitzing wrote:
 Hi!
 
  Any aditional security within * is fine, but if someone is simply
  drowning your bandwith, action must be taken at a lower level.
  Otherwise you endup re-inventing the wheel for D.o.s. attackes for voip,
  mail, ssh, ldap, http, rsync, (or any other service you might be running)
 
 However, I *still* think Asterisk should provide a delayreject option 
 in sip.conf to greatly slow down answering request avanlanches. That will 
 help to address the bandwidth issue if the attacker is configured to wait 
 for a response before starting the next request.
 
 Apart from that here are the most important messages: Use strong 
 passwords in sip.conf, and use keys in iax.conf, and avoid usernames that 
 can be guessed too easily (numbers from 100 to  and first names).
 

Agreed, best would be to only use ssl-certificates for authentication,
but not all parts involved support that, (to put it mildly...)

hw

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread --[ UxBoD ]--
- Original Message -
 Speaking of all these attacks, are there any good web managed security
 monitor tools for CentOS out there that can be installed on the system
 so that it can give us a visual of let's multiple failed attempts
 against SSH or HTTPd?
 
 
 Something nice that is simple and doesn't eat a lot resources and
 spits out everything on the screen?
 
 
 Thanks,
 Bruce

How about http://www.ossec.net which you could later integrate with 
http://www.splunk.com/.

-- 
Thanks - Phil

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread bruce bruce
Cool. I am just looking over splunk. Isn't that enough by it's own? or is
OSSEC needed to give it raw data? I think these two will take quite some
time to understand. Anything simpler out there as well?

Thanks,
Bruce

On Tue, Apr 13, 2010 at 10:42 AM, --[ UxBoD ]-- ux...@splatnix.net wrote:

 - Original Message -
  Speaking of all these attacks, are there any good web managed security
  monitor tools for CentOS out there that can be installed on the system
  so that it can give us a visual of let's multiple failed attempts
  against SSH or HTTPd?
 
 
  Something nice that is simple and doesn't eat a lot resources and
  spits out everything on the screen?
 
 
  Thanks,
  Bruce

 How about http://www.ossec.net which you could later integrate with
 http://www.splunk.com/.

 --
 Thanks - Phil

 --
 _
 -- Bandwidth and Colocation Provided by http://www.api-digital.com --
 New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

 asterisk-users mailing list
 To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread --[ UxBoD ]--
- Original Message -
 Cool. I am just looking over splunk. Isn't that enough by it's own? or
 is OSSEC needed to give it raw data? I think these two will take quite
 some time to understand. Anything simpler out there as well?
 
 
 Thanks,
 Bruce
 
 
 On Tue, Apr 13, 2010 at 10:42 AM, --[ UxBoD ]--  ux...@splatnix.net 
 wrote:
 
 
 
 - Original Message -
  Speaking of all these attacks, are there any good web managed
  security monitor tools for CentOS out there that can be installed on
  the system
  so that it can give us a visual of let's multiple failed attempts
  against SSH or HTTPd?
 
 
  Something nice that is simple and doesn't eat a lot resources and
  spits out everything on the screen?
 
 
  Thanks,
  Bruce
 
 How about http://www.ossec.net which you could later integrate with
 http://www.splunk.com/ .
 

OSSEC has a number of Asterisk rules already built it; including picking up 
failed SIP registrations.  It also has the feature called Active Response which 
when a user defined threshold of failed events happen it is able to 
automatically add a IPtables/PF drop rule for the source IP.
-- 
Thanks, Phil

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Tzafrir Cohen
On Tue, Apr 13, 2010 at 04:32:58PM +0200, Hans Witvliet wrote:
 On Tue, 2010-04-13 at 15:49 +0200, Philipp von Klitzing wrote:
  Hi!
  
   Any aditional security within * is fine, but if someone is simply
   drowning your bandwith, action must be taken at a lower level.
   Otherwise you endup re-inventing the wheel for D.o.s. attackes for voip,
   mail, ssh, ldap, http, rsync, (or any other service you might be running)
  
  However, I *still* think Asterisk should provide a delayreject option 
  in sip.conf to greatly slow down answering request avanlanches. That will 
  help to address the bandwidth issue if the attacker is configured to wait 
  for a response before starting the next request.
  
  Apart from that here are the most important messages: Use strong 
  passwords in sip.conf, and use keys in iax.conf, and avoid usernames that 
  can be guessed too easily (numbers from 100 to  and first names).
  
 
 Agreed, best would be to only use ssl-certificates for authentication,
 but not all parts involved support that, (to put it mildly...)

Secure authentication won't solve the problem of attackers flodding your
pipe. Especially not if you have ADSL or similar connection.

-- 
   Tzafrir Cohen
icq#16849755  jabber:tzafrir.co...@xorcom.com
+972-50-7952406   mailto:tzafrir.co...@xorcom.com
http://www.xorcom.com  iax:gu...@local.xorcom.com/tzafrir

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Steve Murphy
Hmmm. It would seem that it would be to Amazon's advantage to jump on this
problem,
because the accounts that are performing this activity are most likely
purchased with
stolen identities, and sooner or later the charges are going to get
reversed. Either the
credit card companies are going to absorb the cost, or the merchants (like
Amazon) at
the other end. And, after listening to merchants grumble about it, I'd
assume that in the
end, Amazon is going to get stiffed for the bill. On someone else's credit
card, I'd imaging they
have almost infinite resources; Bandwidth to burn, the best and most
powerful hosts.
So what if they rack up thousands of dollars? They are probably organized
crime units in Romania or
whatever.

murf


On Tue, Apr 13, 2010 at 11:21 AM, Tzafrir Cohen tzafrir.co...@xorcom.comwrote:

 On Tue, Apr 13, 2010 at 04:32:58PM +0200, Hans Witvliet wrote:
  On Tue, 2010-04-13 at 15:49 +0200, Philipp von Klitzing wrote:
   Hi!
  
Any aditional security within * is fine, but if someone is simply
drowning your bandwith, action must be taken at a lower level.
Otherwise you endup re-inventing the wheel for D.o.s. attackes for
 voip,
mail, ssh, ldap, http, rsync, (or any other service you might be
 running)
  
   However, I *still* think Asterisk should provide a delayreject option
   in sip.conf to greatly slow down answering request avanlanches. That
 will
   help to address the bandwidth issue if the attacker is configured to
 wait
   for a response before starting the next request.
  
   Apart from that here are the most important messages: Use strong
   passwords in sip.conf, and use keys in iax.conf, and avoid usernames
 that
   can be guessed too easily (numbers from 100 to  and first names).
  
 
  Agreed, best would be to only use ssl-certificates for authentication,
  but not all parts involved support that, (to put it mildly...)

 Secure authentication won't solve the problem of attackers flodding your
 pipe. Especially not if you have ADSL or similar connection.

 --
   Tzafrir Cohen
 icq#16849755  
 jabber:tzafrir.co...@xorcom.comjabber%3atzafrir.co...@xorcom.com
 +972-50-7952406   mailto:tzafrir.co...@xorcom.com
 http://www.xorcom.com  iax:gu...@local.xorcom.com/tzafrir

 --
 _
 -- Bandwidth and Colocation Provided by http://www.api-digital.com --
 New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

 asterisk-users mailing list
 To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users




-- 
Steve Murphy
ParseTree Corp
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Randy R
On Tue, Apr 13, 2010 at 8:25 PM, Steve Murphy m...@parsetree.com wrote:
 Hmmm. It would seem that it would be to Amazon's advantage to jump on this
 problem,

I am pushing for this, please everyone who is suffering from this
problem, submit it or write to complain to Amazon and post the message
publicly wherever you can in a civilized, even lucid message to them.
If you do it they will take notice. They need to see this as a problem
in their space and take reasonable steps to either make it harder to
abuse their service and/or easier to report the abuse, which they must
then act upon.  The thread here is an interesting discussion, but it
can't compare to actual action they might take if your complaints
reach them. They will need to act, but only if you force them to take
notice.

I believe Amazon has a chance to distinguish themselves from ISP who
allow spammers to do mass mailings without any real challenge. They
will act if you continue putting the message out there.

/r

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-13 Thread Fred Posner
On Apr 13, 2010, at 4:22 PM, Randy R wrote:

 On Tue, Apr 13, 2010 at 8:25 PM, Steve Murphy m...@parsetree.com wrote:
 Hmmm. It would seem that it would be to Amazon's advantage to jump on this
 problem,
 
 I am pushing for this, please everyone who is suffering from this
 problem, submit it or write to complain to Amazon and post the message
 publicly wherever you can in a civilized, even lucid message to them.
 If you do it they will take notice. They need to see this as a problem
 in their space and take reasonable steps to either make it harder to
 abuse their service and/or easier to report the abuse, which they must
 then act upon.  The thread here is an interesting discussion, but it
 can't compare to actual action they might take if your complaints
 reach them. They will need to act, but only if you force them to take
 notice.
 
 I believe Amazon has a chance to distinguish themselves from ISP who
 allow spammers to do mass mailings without any real challenge. They
 will act if you continue putting the message out there.
 
 /r
 

The only person I've gotten to respond to me is Kay Kinton from Amazon's Public 
Relations. Although she responded, she will not take a phone call or discuss 
the issue over the phone. She gave me two statements so far, which I will be 
posting on VoIPTechChat.com (one's there already).

Statement 1:

Hello Fred and thank you for contacting us.  Over the weekend, we received a 
report of a suspicious account and began an investigation.  Our normal process 
is to connect the two involved parties to give them an opportunity to talk in 
case the abuse is not malicious but is simply heavy traffic from a legitimate 
customer.  If that is not successful, we then move to isolate the traffic from 
the abusing party.  Normally this process works quite well for situations our 
customers have encountered, however this incident has highlighted the need for 
an escalation process to address potentially malicious attacks more quickly. 
Additionally, we are working on quickly putting better protections and 
processes in place to better guard against unwanted SIP traffic.  We take the 
security of our customers and our quality of service very seriously, and will  
continue to work to improve our processes and services for customers.

/end statement 1

This was of course was while attacks were continuing so I asked for a 
discussion and sent her several questions when she told me what else can I 
tell you.

Today I received statement 2:

Hello Fred. We believe that we've identified and shut down the illegal activity 
and are closing the loop with customers.  We'd certainly be interested in 
hearing of the cases you refer to below so we can follow up.

/end statement 2.

So.. since she's interested... please let her know how they did not respond to 
your complaints, the attacks, and well, any of the concerns you have to which 
she should follow up:

Kay Kinton
kin...@amazon.com
Public Relations Manager
Amazon Web Services
Phone:  206-266-8387

---fred
http://qxork.com


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Fred Posner

On Apr 12, 2010, at 9:12 AM, --[ UxBoD ]-- wrote:

 
 
 Perhaps if there was a Asterisk RBL we could all contribute to; for which we 
 could then hook into and drop any connection where a source IP is listed ?
 -- 
 Thanks, Phil
 

I love the idea of a RBL... count me in for contributing.

Especially considering the ridiculous response I received from Amazon. 
(Basically told me to submit host, destination, port, proto, and log... which 
of course was already included in the original complaint)

---fred
http://qxork.com


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread --[ UxBoD ]--
- Original Message -
 Am 11.04.2010 17:05, schrieb Mark Smith:
  Same this end from 184.73.17.150.
  Use this little piece of iptables magic to block the whole of
  Amazon's EC2 ip-
  range.
 
  iptables -F
  iptables -A INPUT -m iprange --src-range
  216.182.224.0-216.182.239.255 -j DROP
  iptables -A INPUT -m iprange --src-range 72.44.32.0-72.44.63.255 -j
  DROP iptables -A INPUT -m iprange --src-range
  67.202.0.0-67.202.63.255 -j DROP
  iptables -A INPUT -m iprange --src-range 75.101.128.0-75.101.255.255
  -j DROP
  iptables -A INPUT -m iprange --src-range 174.129.0.0-174.129.255.255
  -j DROP
  iptables -A INPUT -m iprange --src-range
  204.236.192.0-204.236.255.255 -j DROP
  iptables -A INPUT -m iprange --src-range 184.73.0.0-184.73.255.255
  -j DROP
  iptables -A INPUT -m iprange --src-range
  216.236.128.0-216.236.191.255 -j DROP
  iptables -A INPUT -m iprange --src-range 184.72.0.0-184.72.63.255 -j
  DROP iptables -A INPUT -m iprange --src-range
  79.125.0.0-79.125.127.255 -j DROP
  service iptables save
 
  This sorts it out in the short-term until Amazon realise their
  service is
  being utilised by arseholes.
 
 
 
 
 
 Hi Mark!
 
 your little iptables magic is a very good idea! Implementation took 
 1 minute :-)
 I'll use it until a better idea comes up ... (which I don't expect
 within a short term)
 
 Thank you!
 
 Norbert
 

Perhaps if there was a Asterisk RBL we could all contribute to; for which we 
could then hook into and drop any connection where a source IP is listed ?
-- 
Thanks, Phil

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Zeeshan Zakaria
I got the same generic response, asking me to submit the same info which I
had already submitted. This clearly show they are not interested in tracing
just another hacker on their cloud.

Zeeshan A Zakaria

--
Sent from my Android phone with K-9 Mail.

On 2010-04-12 9:24 AM, Fred Posner f...@teamforrest.com wrote:


On Apr 12, 2010, at 9:12 AM, --[ UxBoD ]-- wrote:



 Perhaps if there was a Asterisk RBL we ...
I love the idea of a RBL... count me in for contributing.

Especially considering the ridiculous response I received from Amazon.
(Basically told me to submit host, destination, port, proto, and log...
which of course was already included in the original complaint)

---fred
http://qxork.com



-- 
_
-- Bandwidth and Colocat...
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Zeeshan Zakaria
If RBL or something is practical, I'm in too. But at what level these
hackers will be blocked? Unless some big ISPs cooprate, it is not much of
use.

Zeeshan A Zakaria

--
Sent from my Android phone with K-9 Mail.

On 2010-04-12 9:24 AM, Fred Posner f...@teamforrest.com wrote:


On Apr 12, 2010, at 9:12 AM, --[ UxBoD ]-- wrote:



 Perhaps if there was a Asterisk RBL we ...
I love the idea of a RBL... count me in for contributing.

Especially considering the ridiculous response I received from Amazon.
(Basically told me to submit host, destination, port, proto, and log...
which of course was already included in the original complaint)

---fred
http://qxork.com



-- 
_
-- Bandwidth and Colocat...
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Chris Owen
On Apr 12, 2010, at 8:17 AM, Fred Posner wrote:

 On Apr 12, 2010, at 9:12 AM, --[ UxBoD ]-- wrote:
 
 
 
 Perhaps if there was a Asterisk RBL we could all contribute to; for which we 
 could then hook into and drop any connection where a source IP is listed ?
 -- 
 Thanks, Phil
 
 
 I love the idea of a RBL... count me in for contributing.

I would contribute to this as well.

Chris

-
Chris Owen - Garden City (620) 275-1900 -  Lottery (noun):
President  - Wichita (316) 858-3000 -A stupidity tax
Hubris Communications Inc  www.hubris.net
-





-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Randy R
On Mon, Apr 12, 2010 at 3:52 PM, Zeeshan Zakaria zisha...@gmail.com wrote:
 If RBL or something is practical, I'm in too. But at what level these
 hackers will be blocked? Unless some big ISPs cooprate, it is not much of
 use.

I've been following this with much interest. I don't see RBL (which I
use extensively for email) as doing much. SOme activity on Twitter
already. Perhaps a hashtag #EC2exploit or something better is needed?

Harness the famous power of social media.

Start making it clear, in a concise, specific a,d policte/civil way
that Amazion needs to do something about this. They need to put in
place a fast reporting system, one that can take the IP, timestamp and
the nature of the complaint and have someone investigate the activity
quickly. This can turn into a telephony botnet if they don't get the
s**t together.

The effect of proper action against the abuse goes further than just
preventing individual attacks, it can help stop cvriminal networks
from growing up.

Use your own publishing power to to state your case out there:

Your blog, Linkedin, Facebook, Twitter, Google Buzz, emails whatever
weapons you have at hand to send Amazon a message. I'm a longtime
Amazon customer for all their products including S3 and Cloudburst, I
will write them about what I think. I suggest you all do the same.

/r

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Danny Nicholas
This thread needs to go into a RBL - guess I'm being part of the problem,
not the solution...

-Original Message-
From: asterisk-users-boun...@lists.digium.com
[mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Chris Owen
Sent: Monday, April 12, 2010 9:04 AM
To: Asterisk Users Mailing List - Non-Commercial Discussion
Subject: Re: [asterisk-users] Being attacked by an Amazon EC2 ...

On Apr 12, 2010, at 8:17 AM, Fred Posner wrote:

 On Apr 12, 2010, at 9:12 AM, --[ UxBoD ]-- wrote:
 
 
 
 Perhaps if there was a Asterisk RBL we could all contribute to; for which
we could then hook into and drop any connection where a source IP is listed
?
 -- 
 Thanks, Phil
 
 
 I love the idea of a RBL... count me in for contributing.

I would contribute to this as well.

Chris

-
Chris Owen - Garden City (620) 275-1900 -  Lottery (noun):
President  - Wichita (316) 858-3000 -A stupidity tax
Hubris Communications Inc  www.hubris.net
-





-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Tom Stordy-Allison
Good article - might solve our problems for now: 
http://jcs.org/notaweblog/2010/04/11/properly_stopping_a_sip_flood

He got the bots to stop by writing a ruby script that responds back to them 
with a SIP 200 OK. 

I'm going give it a go when I'm back home...

Cheers,

Tom

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Steve Howes

On 12 Apr 2010, at 17:30, Tom Stordy-Allison wrote:

 Good article - might solve our problems for now: 
 http://jcs.org/notaweblog/2010/04/11/properly_stopping_a_sip_flood
 
 He got the bots to stop by writing a ruby script that responds back to them 
 with a SIP 200 OK. 
 
 I'm going give it a go when I'm back home...

Send a 'moved temporarily' SIP message and redirect it back to them? ;)

S
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Darrick Hartman
On 04/12/2010 08:17 AM, Fred Posner wrote:

 On Apr 12, 2010, at 9:12 AM, --[ UxBoD ]-- wrote:



 Perhaps if there was a Asterisk RBL we could all contribute to; for
 which we could then hook into and drop any connection where a
 source IP is listed ? -- Thanks, Phil


 I love the idea of a RBL... count me in for contributing.

 Especially considering the ridiculous response I received from
 Amazon. (Basically told me to submit host, destination, port, proto,
 and log... which of course was already included in the original
 complaint)

I don't think anyone else brought up the Spamhaus DROP project.  It's a 
blacklist of IP addresses and address ranges which are known to ONLY be 
used for malicious purposes.

http://www.spamhaus.org/drop/

We could establish something similar to that for VOIP attacks.  It may 
not be exactly a trivial system to maintain such a list. (removing IP's 
after X amount of time, disputing false claims etc).  Maybe someone 
could contact spamhaus to create a list for VOIP since they seem to have 
a nice system in place?

Darrick
-- 
Darrick Hartman
DJH Solutions, LLC
http://www.djhsolutions.com

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Randy R
On Mon, Apr 12, 2010 at 6:51 PM, Darrick Hartman
dhart...@djhsolutions.com wrote:
 I don't think anyone else brought up the Spamhaus DROP project.  It's a
 blacklist of IP addresses and address ranges which are known to ONLY be
 used for malicious purposes.

 http://www.spamhaus.org/drop/


Because this is in Amazon's interest, THEY should set up a way to
report these. Once you detect (in a script) that this is in their
range, a redirect would feed their own log with all the data they'd
need to proceed. This would work well, especially if they made you
register your calling IP to them, or authenticate. That way your
server and IP is on record and the report authenticated. Isn't this
reasonable?

/r

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Fred Posner
On Apr 12, 2010, at 1:05 PM, Randy R wrote:

 On Mon, Apr 12, 2010 at 6:51 PM, Darrick Hartman
 dhart...@djhsolutions.com wrote:
 I don't think anyone else brought up the Spamhaus DROP project.  It's a
 blacklist of IP addresses and address ranges which are known to ONLY be
 used for malicious purposes.
 
 http://www.spamhaus.org/drop/
 
 
 Because this is in Amazon's interest, THEY should set up a way to
 report these. Once you detect (in a script) that this is in their
 range, a redirect would feed their own log with all the data they'd
 need to proceed. This would work well, especially if they made you
 register your calling IP to them, or authenticate. That way your
 server and IP is on record and the report authenticated. Isn't this
 reasonable?
 
 /r
 

I have ZERO trust in Amazon at the moment. Their AWS form to report abuse 
fails. And despite all of our complaints, attacks continue.

I do like the idea of using something that's third party and then it's up to 
amazon to police itself to keep off of that list... just like every other 
ISP/IPP/NOC.

---fred
http://qxork.com


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Darrick Hartman
On 04/12/2010 12:05 PM, Randy R wrote:
 On Mon, Apr 12, 2010 at 6:51 PM, Darrick Hartman
 dhart...@djhsolutions.com  wrote:
 I don't think anyone else brought up the Spamhaus DROP project.  It's a
 blacklist of IP addresses and address ranges which are known to ONLY be
 used for malicious purposes.

 http://www.spamhaus.org/drop/


 Because this is in Amazon's interest, THEY should set up a way to
 report these. Once you detect (in a script) that this is in their
 range, a redirect would feed their own log with all the data they'd
 need to proceed. This would work well, especially if they made you
 register your calling IP to them, or authenticate. That way your
 server and IP is on record and the report authenticated. Isn't this
 reasonable?

Randy,

That only addresses EC2 (and assumes that Amazon has any interest in 
protecting their reputation).  What about attacks that come from other 
locations?  Granted it's pretty easy to buy time on an EC2 server so 
this may be the primary source for a period of time.

Darrick
-- 
Darrick Hartman
DJH Solutions, LLC
http://www.djhsolutions.com

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread --[ UxBoD ]--
- Original Message -
 On 04/12/2010 12:05 PM, Randy R wrote:
  On Mon, Apr 12, 2010 at 6:51 PM, Darrick Hartman
  dhart...@djhsolutions.com wrote:
  I don't think anyone else brought up the Spamhaus DROP project.
  It's a
  blacklist of IP addresses and address ranges which are known to
  ONLY be
  used for malicious purposes.
 
  http://www.spamhaus.org/drop/
 
 
  Because this is in Amazon's interest, THEY should set up a way to
  report these. Once you detect (in a script) that this is in their
  range, a redirect would feed their own log with all the data they'd
  need to proceed. This would work well, especially if they made you
  register your calling IP to them, or authenticate. That way your
  server and IP is on record and the report authenticated. Isn't this
  reasonable?
 
 Randy,
 
 That only addresses EC2 (and assumes that Amazon has any interest in
 protecting their reputation). What about attacks that come from other
 locations? Granted it's pretty easy to buy time on an EC2 server so
 this may be the primary source for a period of time.
 
 Darrick
 -- Darrick Hartman
 DJH Solutions, LLC
 http://www.djhsolutions.com
 

Hence something like a RBL.  I know the original OP was concerned about the 
bandwidth but TBH that is no different than rejecting rogue NetBios traffic 
that hits your router.  It will still take away from your bandwidth cap.
-- 
Thanks, Phil

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-12 Thread Roderick A. Anderson
Darrick Hartman wrote:
 On 04/12/2010 12:05 PM, Randy R wrote:
 On Mon, Apr 12, 2010 at 6:51 PM, Darrick Hartman
 dhart...@djhsolutions.com  wrote:

snip /

 Randy,
 
 That only addresses EC2 (and assumes that Amazon has any interest in 
 protecting their reputation).  What about attacks that come from other 
 locations?  Granted it's pretty easy to buy time on an EC2 server so 
 this may be the primary source for a period of time.

What is a reasonable number of connections attempts per minute?

I have a iptables rule set I use against SSH floods (script kiddies) 
that I think could be adapted to work with the method shown at:

http://jcs.org/notaweblog/2010/04/11/properly_stopping_a_sip_flood

My settings allow up to 4 connection attempts per minute and if exceeded 
the connection gets dropped. There is a whitelist setting that allows 
IPs or ranges to get past this.  (I need this for Linux-Vserver guests 
as I may connect to more than 4 in a one minute period.)

The this rule set doesn't need to know where the connection came from. 
If it tries over four in a minute and it gets dropped.

I run Asterisk for my _very_ small business and provide some support for 
another small business.  Neither of us has experienced these floods so I 
don't know what a reasonable number of connection attempts per minute 
(per second?) would be.

Anyway here is the -- untested -- iptables rules:

-N SIPREG_WL
-A SIPREG_WL -s 192.168.0.88 -m recent --remove --name SIPREG -j ACCEPT
-A RH-Firewall-1-INPUT -p udp --dport 5060 -m state --state NEW -m 
recent --set --name SIPREG
-A RH-Firewall-1-INPUT -p udp --dport 5060 -m state --state NEW -j SIPREG_WL
-A RH-Firewall-1-INPUT -p udp --dport 5060 -m state --state NEW -m 
recent --update --seconds 60 --hitcount 4 --rttl --name SIPREG
-j REDIRECT --to-port 5061


\\||/
Rod
-- 

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2

2010-04-12 Thread JR Richardson
 Perhaps if there was a Asterisk RBL we could all contribute to; for
 which we could then hook into and drop any connection where a
 source IP is listed ? -- Thanks, Phil


 I love the idea of a RBL... count me in for contributing.

 Especially considering the ridiculous response I received from
 Amazon. (Basically told me to submit host, destination, port, proto,
 and log... which of course was already included in the original
 complaint)

 I don't think anyone else brought up the Spamhaus DROP project.  It's a
 blacklist of IP addresses and address ranges which are known to ONLY be
 used for malicious purposes.

 http://www.spamhaus.org/drop/

 We could establish something similar to that for VOIP attacks.  It may
 not be exactly a trivial system to maintain such a list. (removing IP's
 after X amount of time, disputing false claims etc).  Maybe someone
 could contact spamhaus to create a list for VOIP since they seem to have
 a nice system in place?

Hi All, good discussion, similar to ones we had a year or so ago.  The
RBL concept is valid, at least to get a repository going that list
malicious activity specific to SIP attacks.
n
I worked with Project Honeypot guys for a while, they are more than
willing to assist, as they already have the backend work done for a
clearing house identifying hackers.  The biggest issue we had a year
ago was to create the mechanism in asterisk to push valid log messages
out to the database and then determine what to do with that data?

I tried to bridge the gap between a few Asterisk developers and the
Honeypot developers, ultimately the project stalled and I got busy
with other matters.  If anyone here would like to pick up the torch
and move this along, I can certainly provide info on how far along we
got and contact info for the parties involved.

Please contact me if you have time to work on this and are interested.
 I'm sure the Project Honeypot guys will be willing to pick this
project back up and work on it.


Thanks.

JR
-- 
JR Richardson
Engineering for the Masses

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread David Quinton
On Sat, 10 Apr 2010 22:34:28 +0100 (BST), Gordon Henderson
gordon+aster...@drogon.net wrote:


Just a heads-up ... my home asterisk server is being flooded by someone 
from IP 184.73.17.150 which is an Amazon EC2 instance by the looks of it - 
they're trying to send SIP subscribes to one account - and they're 
flooding the requests in - it's averaging some 600Kbits/sec of incoming 
UDP data or about 200 a second )-:

This is much worse than anything else I've seen.


Same her but 184.73.17.122.
Look what they did to my latency, Gordon:-
http://f8lure.mouselike.org/archived_graphs/westek.bizorg.co.uk_day10.png

I've had bookmarks to Fail2Ban links on my desktop for a year now.
Guess I'll have to do something about it.

If, hypothetically, I'd put that IP into hosts.deny - would it have
stopped them?


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Gordon Henderson
On Sun, 11 Apr 2010, David Quinton wrote:

 On Sat, 10 Apr 2010 22:34:28 +0100 (BST), Gordon Henderson
 gordon+aster...@drogon.net wrote:

 Just a heads-up ... my home asterisk server is being flooded by someone
 from IP 184.73.17.150 which is an Amazon EC2 instance by the looks of it -
 they're trying to send SIP subscribes to one account - and they're
 flooding the requests in - it's averaging some 600Kbits/sec of incoming
 UDP data or about 200 a second )-:

 This is much worse than anything else I've seen.

 Same her but 184.73.17.122.

Ah, so not just me then. Looks like someone is (ab)using EC2 to try to 
hack peoples systems, and they're not doing it nicely. 200 SIP 
registrations a second was enough to have a big impact on my 500MHz 
system.

 Look what they did to my latency, Gordon:-
 http://f8lure.mouselike.org/archived_graphs/westek.bizorg.co.uk_day10.png

Oddly enough my latency wasn't being affected at all - however what I was 
seeing was my ADSL router being cripped with 200 packets a second in  out 
- to the extent that something would go bang inside it and it would 
drop the PPPoA session and then re-start. This was an old Draytek 2600 - I 
replaced it with a new Draytek 2820 and it was them fine.

 I've had bookmarks to Fail2Ban links on my desktop for a year now.
 Guess I'll have to do something about it.

Fail2ban needs python which I won't run on a PBX, however there are many 
iptables runes to help anyway without the need to trawl through log-files. 
However, I've blocked it in the draytek aynway.

The issue for me (and I suspect others) is that while we can firewall it, 
the data is still coming down the wires and for those of us who pay per 
byte transfered (or have fixed monthly caps on their broadband services) 
it could end up costing money or getting you cut-off.

 If, hypothetically, I'd put that IP into hosts.deny - would it have
 stopped them?

/etc/hosts.deny ? No. That would not have stopped it. Although I've just 
checked it might - if it's using tcp-wrappers and there is a post about it

   http://www.mail-archive.com/asterisk-...@lists.digium.com/msg36772.html

but I don't know if it's implemented yet.

I emailled Amazon on their ec2-abuse address yesterday, but have not had a 
reply. My bet is that as long as they get the money, they don't care.

My broadband ISP is slow to react to support emails of this nature and I'm 
not sure they would block it anyway. I know my upstream hosting ISP would 
block it at their borders immediately if I asked, but fortunately they've 
not attacked them - yet.

It's still going on - and has been since 6am yesterday - that's now 26 
hours.

Gordon

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread David Quinton
On Sun, 11 Apr 2010 08:09:02 +0100 (BST), Gordon Henderson
gordon+aster...@drogon.net wrote:


 Look what they did to my latency, Gordon:-
 http://f8lure.mouselike.org/archived_graphs/westek.bizorg.co.uk_day10.png

Oddly enough my latency wasn't being affected at all - however what I was 
seeing was my ADSL router being cripped with 200 packets a second in  out 
- to the extent that something would go bang inside it and it would 
drop the PPPoA session and then re-start. This was an old Draytek 2600 - I 
replaced it with a new Draytek 2820 and it was them fine.

I replaced my old 2600 with a BT Business hub a few months ago.
The log seemed say that there were loads of corected packets.
The annoying thing is that I was (trying to) work at the time and I
saw the LED flashing incessantly. I checked the ther Linux box and did
a netstat and saw nothing awry, an I thought I'd done the same on
the Asterisk box.
Obviously I should have looked at teh log file, because it was very
obvious when I looked this morning!

It's still going on - and has been since 6am yesterday - that's now 26 
hours.

Hasn't restarted here yet
Fingers crossed.


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread --[ UxBoD ]--
- Original Message -
 On Sun, 11 Apr 2010, David Quinton wrote:
 
  On Sat, 10 Apr 2010 22:34:28 +0100 (BST), Gordon Henderson
  gordon+aster...@drogon.net wrote:
 
  Just a heads-up ... my home asterisk server is being flooded by
  someone from IP 184.73.17.150 which is an Amazon EC2 instance by
  the looks of it -
  they're trying to send SIP subscribes to one account - and they're
  flooding the requests in - it's averaging some 600Kbits/sec of
  incoming
  UDP data or about 200 a second )-:
 
  This is much worse than anything else I've seen.
 
  Same her but 184.73.17.122.
 
 Ah, so not just me then. Looks like someone is (ab)using EC2 to try to
 hack peoples systems, and they're not doing it nicely. 200 SIP
 registrations a second was enough to have a big impact on my 500MHz
 system.
 
  Look what they did to my latency, Gordon:-
  http://f8lure.mouselike.org/archived_graphs/westek.bizorg.co.uk_day10.png
 
 Oddly enough my latency wasn't being affected at all - however what I
 was seeing was my ADSL router being cripped with 200 packets a second
 in  out
 - to the extent that something would go bang inside it and it would
 drop the PPPoA session and then re-start. This was an old Draytek 2600
 - I
 replaced it with a new Draytek 2820 and it was them fine.
 
  I've had bookmarks to Fail2Ban links on my desktop for a year now.
  Guess I'll have to do something about it.
 
 Fail2ban needs python which I won't run on a PBX, however there are
 many iptables runes to help anyway without the need to trawl through
 log-files. However, I've blocked it in the draytek aynway.
 
 The issue for me (and I suspect others) is that while we can firewall
 it, the data is still coming down the wires and for those of us who
 pay per
 byte transfered (or have fixed monthly caps on their broadband
 services) it could end up costing money or getting you cut-off.
 
  If, hypothetically, I'd put that IP into hosts.deny - would it have
  stopped them?
 
 /etc/hosts.deny ? No. That would not have stopped it. Although I've
 just checked it might - if it's using tcp-wrappers and there is a post
 about it
 
 http://www.mail-archive.com/asterisk-...@lists.digium.com/msg36772.html
 
 but I don't know if it's implemented yet.
 
 I emailled Amazon on their ec2-abuse address yesterday, but have not
 had a
 reply. My bet is that as long as they get the money, they don't care.
 
 My broadband ISP is slow to react to support emails of this nature and
 I'm not sure they would block it anyway. I know my upstream hosting
 ISP would
 block it at their borders immediately if I asked, but fortunately
 they've not attacked them - yet.
 
 It's still going on - and has been since 6am yesterday - that's now 26
 hours.
 
 Gordon
 
Gordon, I have one a while ago hitting my system from EC2.  Like yourself I did 
report it though it took about 24 hours for them to get back to me.  They asked 
for proof that the attack was from one of their IP spaces.  I sent the 
necessary information and the attack did stop.  It would be nice if they 
reacted a bit quicker; though I guess it depends on how many people are 
reporting issues.

In the end I set up OSSEC (http://www.ossec.net) and wrote a rule that would 
monitor for failed SIP registrations. If a few occurred within a short space of 
time the Active Response kicks in and blocks the IP address using IPTables.
-- 
Thanks, Phil


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Administrator TOOTAI
Gordon Henderson a écrit :
 Just a heads-up ... my home asterisk server is being flooded by someone 
 from IP 184.73.17.150 which is an Amazon EC2 instance by the looks of it - 
 they're trying to send SIP subscribes to one account - and they're 
 flooding the requests in - it's averaging some 600Kbits/sec of incoming 
 UDP data or about 200 a second )-:

 This is much worse than anything else I've seen.
   
List of Amazon IP's from which we already have been attacked on several 
of our servers in Europe (blocked with Fail2Ban):

75.101.195.70
79.125.30.56
184.72.6.92
184.73.70.8
184.73.21.31
184.73.16.184
204.236.169.224

We also faced attack from China, Germany, Romania, Israel and Palestine
-- 
Daniel

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Gordon Henderson
On Sun, 11 Apr 2010, --[ UxBoD ]-- wrote:

 In the end I set up OSSEC (http://www.ossec.net) and wrote a rule that 
 would monitor for failed SIP registrations. If a few occurred within a 
 short space of time the Active Response kicks in and blocks the IP 
 address using IPTables. -- Thanks, Phil

Cheers - but it's not blocking that's the real issue, that's trivial in my 
router or on the PBX, it's that my monthly ADSL data cap is being used up 
and my ISP is not responding (actually, they might if I phone them, but 
it's not desperate right now as I'm unlimited at the weekend), and neither 
is Amazon.

My currently monthly peak-time cap is 45GB - 8am to 8pm and they seem to 
be eating up some 7-10GB a day... So I might actually be OK and can just 
weather it out, but it's still annoying.

I'm tempted to just block all of Amazons EC2 and say to hell with them. 
Shouldn't be too hard to track them down - eg. from whois on that IP:

NetRange:   72.44.32.0 - 72.44.63.255
CIDR:   72.44.32.0/19
NetName:AMAZON-EC2-2

NetRange:   75.101.128.0 - 75.101.255.255
CIDR:   75.101.128.0/17
NetName:AMAZON-EC2-4

NetRange:   67.202.0.0 - 67.202.63.255
CIDR:   67.202.0.0/18
NetName:AMAZON-EC2-3

NetRange:   174.129.0.0 - 174.129.255.255
CIDR:   174.129.0.0/16
NetName:AMAZON-EC2-5

NetRange:   204.236.128.0 - 204.236.255.255
CIDR:   204.236.128.0/17
NetName:AMAZON-EC2-6

NetRange:   184.72.0.0 - 184.73.255.255
CIDR:   184.72.0.0/15
NetName:AMAZON-EC2-7

(so much for running out of ipv4 address space when amazon has millions)

And there are well knowing published lists from all chinese hosts, etc. 
too. Easy enough too cook up iptables to allow data from sites I connect 
out to, but block all incoming new connections.

Gordon

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Zeeshan Zakaria
My experience is that as long as the hackers are getting any kind of
response from your server, they'll keep their attack on, in a hope that
they'll get into your system sooner or later. After all it is just some
computers doing the work for them, no human is phycally getting tired here.
This is why when you block them in your iptables, and they stop getting
response from your end, i.e. no ping reply, no sip response, nothing
basically, then they eventually take their attack somewhere else probably
because they (or their hack attempt software) either assume that the ip they
were attacking is no longer valid for the attack or the user has taken
enough security measures that attacking him is not worth the effort.

On the contrary, my experience, if you don't block them, eventually attacks
increase. Probably they let their other hacker friends know too that your
server is a good candidate for hack attempt.

Obvoiously its only the ISPs who can truly stop such attacks by blocking
them at their routers. If the hackers decide to keep bugging you,
unfortunately nothing can you do to protect your bandwdith waste.

But I wonder if one's router doesn't respond back, e.g. it is physically
off, and someone is doing such an attack, do the ISPs still consider it
bandwidth usage?

Zeeshan A Zakaria

--
Sent from my Android phone with K-9 Mail.

On 2010-04-11 7:41 AM, Gordon Henderson
gordon+aster...@drogon.netgordon%2baster...@drogon.net
wrote:

On Sun, 11 Apr 2010, --[ UxBoD ]-- wrote:

 In the end I set up OSSEC (http://www.ossec.net) and wr...
Cheers - but it's not blocking that's the real issue, that's trivial in my
router or on the PBX, it's that my monthly ADSL data cap is being used up
and my ISP is not responding (actually, they might if I phone them, but
it's not desperate right now as I'm unlimited at the weekend), and neither
is Amazon.

My currently monthly peak-time cap is 45GB - 8am to 8pm and they seem to
be eating up some 7-10GB a day... So I might actually be OK and can just
weather it out, but it's still annoying.

I'm tempted to just block all of Amazons EC2 and say to hell with them.
Shouldn't be too hard to track them down - eg. from whois on that IP:

NetRange:   72.44.32.0 - 72.44.63.255
CIDR:   72.44.32.0/19
NetName:AMAZON-EC2-2

NetRange:   75.101.128.0 - 75.101.255.255
CIDR:   75.101.128.0/17
NetName:AMAZON-EC2-4

NetRange:   67.202.0.0 - 67.202.63.255
CIDR:   67.202.0.0/18
NetName:AMAZON-EC2-3

NetRange:   174.129.0.0 - 174.129.255.255
CIDR:   174.129.0.0/16
NetName:AMAZON-EC2-5

NetRange:   204.236.128.0 - 204.236.255.255
CIDR:   204.236.128.0/17
NetName:AMAZON-EC2-6

NetRange:   184.72.0.0 - 184.73.255.255
CIDR:   184.72.0.0/15
NetName:AMAZON-EC2-7

(so much for running out of ipv4 address space when amazon has millions)

And there are well knowing published lists from all chinese hosts, etc.
too. Easy enough too cook up iptables to allow data from sites I connect
out to, but block all incoming new connections.

Gordon


-- 
_
-- Bandwidth and Colocati...
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Gordon Henderson
On Sun, 11 Apr 2010, Zeeshan Zakaria wrote:

 My experience is that as long as the hackers are getting any kind of
 response from your server, they'll keep their attack on, in a hope that
 they'll get into your system sooner or later. After all it is just some
 computers doing the work for them, no human is phycally getting tired here.
 This is why when you block them in your iptables, and they stop getting
 response from your end, i.e. no ping reply, no sip response, nothing
 basically, then they eventually take their attack somewhere else probably
 because they (or their hack attempt software) either assume that the ip they
 were attacking is no longer valid for the attack or the user has taken
 enough security measures that attacking him is not worth the effort.

 On the contrary, my experience, if you don't block them, eventually attacks
 increase. Probably they let their other hacker friends know too that your
 server is a good candidate for hack attempt.

Very probably true...

 Obvoiously its only the ISPs who can truly stop such attacks by blocking
 them at their routers. If the hackers decide to keep bugging you,
 unfortunately nothing can you do to protect your bandwdith waste.

 But I wonder if one's router doesn't respond back, e.g. it is physically
 off, and someone is doing such an attack, do the ISPs still consider it
 bandwidth usage?

Intersting - I'm not sure. Currently my router isn't responding, but it 
still has to soak up the packet, and as it's being counted from the ISPs 
end, it's probably being 'counted' towards my allowance.

I don't particularly want to turn it off though - I do all sorts of 
automated backups, etc. overnight as well as monitoring of my hosted 
servers, customers, etc

However, I've just had a reply back from Amazon to say that they have 
contacted the hosts owner - but that was just over an hour ago, and when I 
removed the firewall rules, they're still trying )-:

Is there any way to sniff the SIP password they're trying? It'd be 
intersting to see what passwords they're guessing - they're trying just 
one account rather than accounts at random.

I've played with sipdump and sipcrack - looks like they're trying a 
different password each time though.

Ho hum.

Gordon

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Norbert Zawodsky
Hello to everyone!

Same here (Vienna, Austria).

I had this attack yesterday 6am (local time) from IP 216.105.128.63

whois 216.105.128.63 returns:

OrgName:Globalvision
OrgID:  ACSIN-3
Address:78 Global Drive
Address:Suite 101
City:   Greenville
StateProv:  SC
PostalCode: 29607
Country:US

NetRange:   216.105.128.0 - 216.105.159.255
CIDR:   216.105.128.0/19
NetName:ACSINC-BLK-1
NetHandle:  NET-216-105-128-0-1
Parent: NET-216-0-0-0-0
NetType:Direct Allocation
NameServer: NS1.ACSINC.NET
NameServer: NS2.ACSINC.NET
Comment:ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
RegDate:1998-10-19
Updated:2004-12-08

OrgTechHandle: HOSTM560-ARIN
OrgTechName:   Hostmaster
OrgTechPhone:  +1-864-467-1333
OrgTechEmail:  hostmas...@acsinc.net

In my case, the attack started at 05:57:45.

Asterisk: 1.2.12.1

They sent 14.288 Register requests trying some common users like
test,admin,sip,user,123,1234, and so on.
Then they started just counting up from user 0
(0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,.) and this way, they found
valid users until 05:59:09 which is 1 minute and 24 seconds or 170
Registers/second

After that, they started to send 66.267 registers until 06:24:08 only
with the found users with random password combinations. 66.267 reg /
1.499 seconds = 44 regs/second

A classic brute force attack. Interesting that the password attacks
came slower than the userid attacks...

At 6:24:23 asterisk obviously crashed because there wered no more log
entries. I noticed the incident because my office phone number was not
reachable when I tried in the morning.

My phones (SNOMs) all are on the same LAN within a 192.168.X.X adress
range. I wonder if everything would become a little bit more secure if
define them with host=192.168.X.X in sip.conf instead of
host=dynamic. I tried it as a quick shot but it didn't work as they
still try to register. Does someone know if this was possible and
where/how to configure it on the snom side?

greetings,
Norbert

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Philipp von Klitzing
Hi!

 My phones (SNOMs) all are on the same LAN within a 192.168.X.X adress
 range. I wonder if everything would become a little bit more secure if
 define them with host=192.168.X.X in sip.conf instead of
 host=dynamic. I tried it as a quick shot but it didn't work as they
 still try to register. Does someone know if this was possible and
 where/how to configure it on the snom side? 

Unfortunately you cannot tell the SNOM to not register for an active 
identity - at least not in the web UI. :-(

Instead use permit/deny in sip.conf for your SIP clients, and most 
importantly: Use strong (and long) passwords.

Philipp


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Zeeshan Zakaria
I don't k know if there is a tool to sniff passwords, but did you check in
/va/log/asterisk/full? Maybe wireshark can be used for this purpose, but
it'll be not that straight forward.

Interestingly I checked log of my server and found out that I was also under
attack yesterday by an Amazon cloud server, IP 184.73.53.22. Thanks to
fail2ban the IP was blocked. But I guess I am now used to these attacks as
it is a routine now and so far fail2ban is working fine for me. But my
server (and now yours too) is in some hackers list of asterisk favourites
and will keep getting under attack.

I'll now send an email to Amazon.

Zeeshan A Zakaria

--
Sent from my Android phone with K-9 Mail.

On 2010-04-11 9:42 AM, Norbert Zawodsky norb...@zawodsky.at wrote:

Hello to everyone!

Same here (Vienna, Austria).

I had this attack yesterday 6am (local time) from IP 216.105.128.63

whois 216.105.128.63 returns:

OrgName:Globalvision
OrgID:  ACSIN-3
Address:78 Global Drive
Address:Suite 101
City:   Greenville
StateProv:  SC
PostalCode: 29607
Country:US

NetRange:   216.105.128.0 - 216.105.159.255
CIDR:   216.105.128.0/19
NetName:ACSINC-BLK-1
NetHandle:  NET-216-105-128-0-1
Parent: NET-216-0-0-0-0
NetType:Direct Allocation
NameServer: NS1.ACSINC.NET
NameServer: NS2.ACSINC.NET
Comment:ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
RegDate:1998-10-19
Updated:2004-12-08

OrgTechHandle: HOSTM560-ARIN
OrgTechName:   Hostmaster
OrgTechPhone:  +1-864-467-1333
OrgTechEmail:  hostmas...@acsinc.net

In my case, the attack started at 05:57:45.

Asterisk: 1.2.12.1

They sent 14.288 Register requests trying some common users like
test,admin,sip,user,123,1234, and so on.
Then they started just counting up from user 0
(0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,.) and this way, they found
valid users until 05:59:09 which is 1 minute and 24 seconds or 170
Registers/second

After that, they started to send 66.267 registers until 06:24:08 only
with the found users with random password combinations. 66.267 reg /
1.499 seconds = 44 regs/second

A classic brute force attack. Interesting that the password attacks
came slower than the userid attacks...

At 6:24:23 asterisk obviously crashed because there wered no more log
entries. I noticed the incident because my office phone number was not
reachable when I tried in the morning.

My phones (SNOMs) all are on the same LAN within a 192.168.X.X adress
range. I wonder if everything would become a little bit more secure if
define them with host=192.168.X.X in sip.conf instead of
host=dynamic. I tried it as a quick shot but it didn't work as they
still try to register. Does someone know if this was possible and
where/how to configure it on the snom side?

greetings,
Norbert


-- 
_
-- Bandwidth and Colocati...
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Fred Posner
On Apr 11, 2010, at 10:06 AM, Zeeshan Zakaria wrote:

 I don't k know if there is a tool to sniff passwords, but did you check in 
 /va/log/asterisk/full? Maybe wireshark can be used for this purpose, but 
 it'll be not that straight forward.
 
 Interestingly I checked log of my server and found out that I was also under 
 attack yesterday by an Amazon cloud server, IP 184.73.53.22. Thanks to 
 fail2ban the IP was blocked. But I guess I am now used to these attacks as it 
 is a routine now and so far fail2ban is working fine for me. But my server 
 (and now yours too) is in some hackers list of asterisk favourites and will 
 keep getting under attack.
 
 I'll now send an email to Amazon.
 
 Zeeshan A Zakaria
 
 --


We were also attacked from 184.73.53.2 yesterday and sent an email to their 
abuse (with no response). The interesting thing about this attack, was instead 
of just making registration attempts, it also tried to call extensions first... 
our dialplan doesn't allow for either but was unusual in that most aren't 
trying to dial an extension before regging them.
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Mark Smith
--[ UxBoD ]-- uxbod at splatnix.net writes:

 
 - Original Message -
  On Sun, 11 Apr 2010, David Quinton wrote:
  
   On Sat, 10 Apr 2010 22:34:28 +0100 (BST), Gordon Henderson
   gordon+asterisk at drogon.net wrote:
  
   Just a heads-up ... my home asterisk server is being flooded by
   someone from IP 184.73.17.150 which is an Amazon EC2 instance by
   the looks of it -
   they're trying to send SIP subscribes to one account - and they're
   flooding the requests in - it's averaging some 600Kbits/sec of
   incoming
   UDP data or about 200 a second )-:
  
   This is much worse than anything else I've seen.
  
   Same her but 184.73.17.122.
  
  Ah, so not just me then. Looks like someone is (ab)using EC2 to try to
  hack peoples systems, and they're not doing it nicely. 200 SIP
  registrations a second was enough to have a big impact on my 500MHz
  system.
  
   Look what they did to my latency, Gordon:-
   http://f8lure.mouselike.org/archived_graphs/westek.bizorg.co.uk_day10.png
  
  Oddly enough my latency wasn't being affected at all - however what I
  was seeing was my ADSL router being cripped with 200 packets a second
  in  out
  - to the extent that something would go bang inside it and it would
  drop the PPPoA session and then re-start. This was an old Draytek 2600
  - I
  replaced it with a new Draytek 2820 and it was them fine.
  
   I've had bookmarks to Fail2Ban links on my desktop for a year now.
   Guess I'll have to do something about it.
  
  Fail2ban needs python which I won't run on a PBX, however there are
  many iptables runes to help anyway without the need to trawl through
  log-files. However, I've blocked it in the draytek aynway.
  
  The issue for me (and I suspect others) is that while we can firewall
  it, the data is still coming down the wires and for those of us who
  pay per
  byte transfered (or have fixed monthly caps on their broadband
  services) it could end up costing money or getting you cut-off.
  
   If, hypothetically, I'd put that IP into hosts.deny - would it have
   stopped them?
  
  /etc/hosts.deny ? No. That would not have stopped it. Although I've
  just checked it might - if it's using tcp-wrappers and there is a post
  about it
  
  http://www.mail-archive.com/asterisk-dev at 
lists.digium.com/msg36772.html
  
  but I don't know if it's implemented yet.
  
  I emailled Amazon on their ec2-abuse address yesterday, but have not
  had a
  reply. My bet is that as long as they get the money, they don't care.
  
  My broadband ISP is slow to react to support emails of this nature and
  I'm not sure they would block it anyway. I know my upstream hosting
  ISP would
  block it at their borders immediately if I asked, but fortunately
  they've not attacked them - yet.
  
  It's still going on - and has been since 6am yesterday - that's now 26
  hours.
  
  Gordon
  
 Gordon, I have one a while ago hitting my system from EC2.  Like yourself I 
did report it though it took about 24
 hours for them to get back to me.  They asked for proof that the attack was 
from one of their IP spaces.  I sent
 the necessary information and the attack did stop.  It would be nice if they 
reacted a bit quicker; though I
 guess it depends on how many people are reporting issues.
 
 In the end I set up OSSEC (http://www.ossec.net) and wrote a rule that would 
monitor for failed SIP
 registrations. If a few occurred within a short space of time the Active 
Response kicks in and blocks the IP
 address using IPTables.


Same this end from 184.73.17.150.

Use this little piece of iptables magic to block the whole of Amazon's EC2 ip-
range.

iptables -F
iptables -A INPUT -m iprange --src-range 216.182.224.0-216.182.239.255 -j DROP
iptables -A INPUT -m iprange --src-range 72.44.32.0-72.44.63.255 -j DROP
iptables -A INPUT -m iprange --src-range 67.202.0.0-67.202.63.255 -j DROP
iptables -A INPUT -m iprange --src-range 75.101.128.0-75.101.255.255 -j DROP
iptables -A INPUT -m iprange --src-range 174.129.0.0-174.129.255.255 -j DROP
iptables -A INPUT -m iprange --src-range 204.236.192.0-204.236.255.255 -j DROP
iptables -A INPUT -m iprange --src-range 184.73.0.0-184.73.255.255 -j DROP
iptables -A INPUT -m iprange --src-range 216.236.128.0-216.236.191.255 -j DROP
iptables -A INPUT -m iprange --src-range 184.72.0.0-184.72.63.255 -j DROP
iptables -A INPUT -m iprange --src-range 79.125.0.0-79.125.127.255 -j DROP
service iptables save

This sorts it out in the short-term until Amazon realise their service is 
being utilised by arseholes.




-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Martin
Its a good idea tos setup Fail2ban, instructions for which are on 
voip-info.org. It at least blocks such IP addresses, hopefully prompting the 
attackers to move their attack somewhere else and leave you alone.
I personally use Fail2ban, it works but wont keep you from flooding your line. 
My last attacker kept trying for 3 days

Another good idea is to lookup in whois database this IP address and see if 
you 
can find contact info for the person responsible for this IP address. Then 
contact them and let them know about this incident.
You can also try to ask your ISP if they can block it on their end.
Fail2ban can send you a Whois info about every blocked IP. Im just not sure if 
any kind of reporting will help :-(

Zeeshan A Zakaria
Martin L 


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Zeeshan Zakaria
I always report at least. This is still better than not bringing it to their
attention. I once worked in the NOC of a big data centre of a major ISP, and
we often get calls regarding IPs from our data centers involved in spams and
hacks, but unless there were a number of complaints, nobody had time or
resources to dedicate them on verifying the validity of individual
complaints and take some action.

Zeeshan A Zakaria

--
Sent from my Android phone with K-9 Mail.

On 2010-04-11 1:41 PM, Martin r...@atlas.cz wrote:

Its a good idea tos setup Fail2ban, instructions for which are on
voip-info.org. It at least bloc...
I personally use Fail2ban, it works but wont keep you from flooding your
line.
My last attacker kept trying for 3 days


Another good idea is to lookup in whois database this IP address and see if
you
can find contact...
Fail2ban can send you a Whois info about every blocked IP. Im just not sure
if
any kind of reporting will help :-(

Zeeshan A Zakaria
Martin L


--

_
-- Bandwidth and Colocation Pr...
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Norbert Zawodsky
Am 11.04.2010 17:05, schrieb Mark Smith:
 Same this end from 184.73.17.150.
 Use this little piece of iptables magic to block the whole of Amazon's EC2 ip-
 range.

 iptables -F
 iptables -A INPUT -m iprange --src-range 216.182.224.0-216.182.239.255 -j DROP
 iptables -A INPUT -m iprange --src-range 72.44.32.0-72.44.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 67.202.0.0-67.202.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 75.101.128.0-75.101.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 174.129.0.0-174.129.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 204.236.192.0-204.236.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 184.73.0.0-184.73.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 216.236.128.0-216.236.191.255 -j DROP
 iptables -A INPUT -m iprange --src-range 184.72.0.0-184.72.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 79.125.0.0-79.125.127.255 -j DROP
 service iptables save

 This sorts it out in the short-term until Amazon realise their service is 
 being utilised by arseholes.




   
Hi Mark!

your little iptables magic is a very good idea! Implementation took  1
minute :-)
I'll use it until a better idea comes up ... (which I don't expect
within a short term)

Thank you!

Norbert

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Tom Stordy-Allison
Hi,

This is exactly what I've just joined this mailing list about.

Has anyone has any luck getting Amazon to stop the instances? I'm stuck with 
around 700Kbps of my 2.5Mbps inbound in use as my firewall blocks the requests 
as below. 

Cheers,

Tom

-Original Message-
From: asterisk-users-boun...@lists.digium.com 
[mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Norbert Zawodsky
Sent: 11 April 2010 20:57
To: asterisk-users@lists.digium.com
Subject: Re: [asterisk-users] Being attacked by an Amazon EC2 ...

Am 11.04.2010 17:05, schrieb Mark Smith:
 Same this end from 184.73.17.150.
 Use this little piece of iptables magic to block the whole of Amazon's EC2 ip-
 range.

 iptables -F
 iptables -A INPUT -m iprange --src-range 216.182.224.0-216.182.239.255 -j DROP
 iptables -A INPUT -m iprange --src-range 72.44.32.0-72.44.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 67.202.0.0-67.202.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 75.101.128.0-75.101.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 174.129.0.0-174.129.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 204.236.192.0-204.236.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 184.73.0.0-184.73.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 216.236.128.0-216.236.191.255 -j DROP
 iptables -A INPUT -m iprange --src-range 184.72.0.0-184.72.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 79.125.0.0-79.125.127.255 -j DROP
 service iptables save

 This sorts it out in the short-term until Amazon realise their service is 
 being utilised by arseholes.




   
Hi Mark!

your little iptables magic is a very good idea! Implementation took  1
minute :-)
I'll use it until a better idea comes up ... (which I don't expect
within a short term)

Thank you!

Norbert

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Mark Smith
Norbert Zawodsky norbert at zawodsky.at writes:

 
 Am 11.04.2010 17:05, schrieb Mark Smith:
  Same this end from 184.73.17.150.
  Use this little piece of iptables magic to block the whole of Amazon's EC2 
ip-
  range.
 
  iptables -F
  iptables -A INPUT -m iprange --src-range 216.182.224.0-216.182.239.255 -j 
DROP
  iptables -A INPUT -m iprange --src-range 72.44.32.0-72.44.63.255 -j DROP
  iptables -A INPUT -m iprange --src-range 67.202.0.0-67.202.63.255 -j DROP
  iptables -A INPUT -m iprange --src-range 75.101.128.0-75.101.255.255 -j 
DROP
  iptables -A INPUT -m iprange --src-range 174.129.0.0-174.129.255.255 -j 
DROP
  iptables -A INPUT -m iprange --src-range 204.236.192.0-204.236.255.255 -j 
DROP
  iptables -A INPUT -m iprange --src-range 184.73.0.0-184.73.255.255 -j DROP
  iptables -A INPUT -m iprange --src-range 216.236.128.0-216.236.191.255 -j 
DROP
  iptables -A INPUT -m iprange --src-range 184.72.0.0-184.72.63.255 -j DROP
  iptables -A INPUT -m iprange --src-range 79.125.0.0-79.125.127.255 -j DROP
  service iptables save
 
  This sorts it out in the short-term until Amazon realise their service is 
  being utilised by arseholes.
 
 
 
 

 Hi Mark!
 
 your little iptables magic is a very good idea! Implementation took  1
 minute 
 I'll use it until a better idea comes up ... (which I don't expect
 within a short term)
 
 Thank you!
 
 Norbert
 

Hi Norbert

An absolute pleasure. It goes without saying the best idea is for Amazon to 
realise it's systems are being abused by this type of moron and shut them 
down, once and for all. It's all very good offering cloud-computing services 
but more responsibility needs to be enforced by the provider.

The iptables solution is obviously not the ultimate solution to the problem 
but it don't half stop the devastating consequences of it such as very poor 
latency and jittery phone-calls due to the crippled upstreamed.

Kindest regards

Mark Smith
MSIT Group Ltd




-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Erik L
FWIW, we're seeing similar attacks. The below is what I posted on NANOG 
earlier, which summarizes Amazon's stellar abuse response. I've also received 
an off-list e-mail from someone who was getting hit with 6Gbps of traffic from 
them (and was not able to reach anyone there either).

Time to start blocking them at the edge. Let their customers complain to them 
instead.

-Original Message-
From: Erik L 
Sent: April 11, 2010 10:38
To: na...@nanog.org
Subject: Seeking Amazon EC2 abuse contact

Could someone from Amazon EC2 please contact me off-list regarding an abuse 
issue from one of their IPs? Alternatively, could someone please send me the 
contact details of someone there?

E-mailing the abuse e-mail listed in WHOIS per their instructions, including 
all pertinent data, results in an auto-reply indicating to use a form on their 
site. Submitting the form results in There has been an error while submitting 
your data. Please try again later. Calling their supposed NOC (as per WHOIS) 
results in You have reached the legal department at Amazon...please leave a 
message.

Thanks

-- 
Erik
Caneris Inc.
Tel: 647-723-6365
Fax: 647-723-5365
Toll-free: 1-888-444-8843
www.caneris.com

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Stuart Sheldon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

We reported abuse Saturday morning... As of yet, no change in traffic.

I have sent requests upstream to filter all UDP/5060 traffic from EC-2
range to stop the DDOS that we are under, but have only gotten 2 of our
4 providers to comply.

At this point, I guess well all just ride it out...

Stu


Tom Stordy-Allison wrote:
 Hi,
 
 This is exactly what I've just joined this mailing list about.
 
 Has anyone has any luck getting Amazon to stop the instances? I'm stuck with 
 around 700Kbps of my 2.5Mbps inbound in use as my firewall blocks the 
 requests as below. 
 
 Cheers,
 
 Tom
 
 -Original Message-
 From: asterisk-users-boun...@lists.digium.com 
 [mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Norbert Zawodsky
 Sent: 11 April 2010 20:57
 To: asterisk-users@lists.digium.com
 Subject: Re: [asterisk-users] Being attacked by an Amazon EC2 ...
 
 Am 11.04.2010 17:05, schrieb Mark Smith:
 Same this end from 184.73.17.150.
 Use this little piece of iptables magic to block the whole of Amazon's EC2 
 ip-
 range.

 iptables -F
 iptables -A INPUT -m iprange --src-range 216.182.224.0-216.182.239.255 -j 
 DROP
 iptables -A INPUT -m iprange --src-range 72.44.32.0-72.44.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 67.202.0.0-67.202.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 75.101.128.0-75.101.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 174.129.0.0-174.129.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 204.236.192.0-204.236.255.255 -j 
 DROP
 iptables -A INPUT -m iprange --src-range 184.73.0.0-184.73.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 216.236.128.0-216.236.191.255 -j 
 DROP
 iptables -A INPUT -m iprange --src-range 184.72.0.0-184.72.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 79.125.0.0-79.125.127.255 -j DROP
 service iptables save

 This sorts it out in the short-term until Amazon realise their service is 
 being utilised by arseholes.




   
 Hi Mark!
 
 your little iptables magic is a very good idea! Implementation took  1
 minute :-)
 I'll use it until a better idea comes up ... (which I don't expect
 within a short term)
 
 Thank you!
 
 Norbert
 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=I4n1
-END PGP SIGNATURE-

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Tom Stordy-Allison
Yeah - I've reported it to the EC2 abuse address about 10 hours ago, with no 
response as of yet.

I'm waiting on my ISP to see if they can block anything further upstream.

I should be lucky it's not 6Gbps like some!

Cheers,

Tom

-Original Message-
From: asterisk-users-boun...@lists.digium.com 
[mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Stuart Sheldon
Sent: 11 April 2010 21:17
To: Asterisk Users Mailing List - Non-Commercial Discussion
Subject: Re: [asterisk-users] Being attacked by an Amazon EC2 ...

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

We reported abuse Saturday morning... As of yet, no change in traffic.

I have sent requests upstream to filter all UDP/5060 traffic from EC-2 range to 
stop the DDOS that we are under, but have only gotten 2 of our
4 providers to comply.

At this point, I guess well all just ride it out...

Stu


Tom Stordy-Allison wrote:
 Hi,
 
 This is exactly what I've just joined this mailing list about.
 
 Has anyone has any luck getting Amazon to stop the instances? I'm stuck with 
 around 700Kbps of my 2.5Mbps inbound in use as my firewall blocks the 
 requests as below. 
 
 Cheers,
 
 Tom
 
 -Original Message-
 From: asterisk-users-boun...@lists.digium.com 
 [mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Norbert 
 Zawodsky
 Sent: 11 April 2010 20:57
 To: asterisk-users@lists.digium.com
 Subject: Re: [asterisk-users] Being attacked by an Amazon EC2 ...
 
 Am 11.04.2010 17:05, schrieb Mark Smith:
 Same this end from 184.73.17.150.
 Use this little piece of iptables magic to block the whole of 
 Amazon's EC2 ip- range.

 iptables -F
 iptables -A INPUT -m iprange --src-range 
 216.182.224.0-216.182.239.255 -j DROP iptables -A INPUT -m iprange 
 --src-range 72.44.32.0-72.44.63.255 -j DROP iptables -A INPUT -m 
 iprange --src-range 67.202.0.0-67.202.63.255 -j DROP iptables -A 
 INPUT -m iprange --src-range 75.101.128.0-75.101.255.255 -j DROP 
 iptables -A INPUT -m iprange --src-range 174.129.0.0-174.129.255.255 
 -j DROP iptables -A INPUT -m iprange --src-range 
 204.236.192.0-204.236.255.255 -j DROP iptables -A INPUT -m iprange 
 --src-range 184.73.0.0-184.73.255.255 -j DROP iptables -A INPUT -m 
 iprange --src-range 216.236.128.0-216.236.191.255 -j DROP iptables -A 
 INPUT -m iprange --src-range 184.72.0.0-184.72.63.255 -j DROP 
 iptables -A INPUT -m iprange --src-range 79.125.0.0-79.125.127.255 -j 
 DROP service iptables save

 This sorts it out in the short-term until Amazon realise their 
 service is being utilised by arseholes.




   
 Hi Mark!
 
 your little iptables magic is a very good idea! Implementation took  
 1 minute :-) I'll use it until a better idea comes up ... (which I 
 don't expect within a short term)
 
 Thank you!
 
 Norbert
 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=I4n1
-END PGP SIGNATURE-

--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to 
Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Fred Posner

On Apr 11, 2010, at 4:06 PM, Tom Stordy-Allison wrote:

 Hi,
 
 This is exactly what I've just joined this mailing list about.
 
 Has anyone has any luck getting Amazon to stop the instances? I'm stuck with 
 around 700Kbps of my 2.5Mbps inbound in use as my firewall blocks the 
 requests as below. 
 
 Cheers,
 
 Tom
 


I can't even get them to acknowledge my complaints.

---fred
http://qxork.com


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-11 Thread Remco Barendse
On Sun, 11 Apr 2010, Mark Smith wrote:


 Same this end from 184.73.17.150.

 Use this little piece of iptables magic to block the whole of Amazon's EC2 ip-
 range.

 iptables -F
 iptables -A INPUT -m iprange --src-range 216.182.224.0-216.182.239.255 -j DROP
 iptables -A INPUT -m iprange --src-range 72.44.32.0-72.44.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 67.202.0.0-67.202.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 75.101.128.0-75.101.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 174.129.0.0-174.129.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 204.236.192.0-204.236.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 184.73.0.0-184.73.255.255 -j DROP
 iptables -A INPUT -m iprange --src-range 216.236.128.0-216.236.191.255 -j DROP
 iptables -A INPUT -m iprange --src-range 184.72.0.0-184.72.63.255 -j DROP
 iptables -A INPUT -m iprange --src-range 79.125.0.0-79.125.127.255 -j DROP
 service iptables save

 This sorts it out in the short-term until Amazon realise their service is
 being utilised by arseholes.


Would this work if using Shorewall? What would a sane ruleset for 
Shorewall look like that implements some sort of rate limiting features?



-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


[asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-10 Thread Gordon Henderson

Just a heads-up ... my home asterisk server is being flooded by someone 
from IP 184.73.17.150 which is an Amazon EC2 instance by the looks of it - 
they're trying to send SIP subscribes to one account - and they're 
flooding the requests in - it's averaging some 600Kbits/sec of incoming 
UDP data or about 200 a second )-:

This is much worse than anything else I've seen.

Gordon

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] Being attacked by an Amazon EC2 ...

2010-04-10 Thread Zeeshan Zakaria
Its a good idea tos setup Fail2ban, instructions for which are on
voip-info.org. It at least blocks such IP addresses, hopefully prompting the
attackers to move their attack somewhere else and leave you alone.

Another good idea is to lookup in whois database this IP address and see if
you can find contact info for the person responsible for this IP address.
Then contact them and let them know about this incident.

You can also try to ask your ISP if they can block it on their end.

Zeeshan A Zakaria

--
Sent from my Android phone with K-9 Mail.

On 2010-04-10 5:39 PM, Gordon Henderson
gordon+aster...@drogon.netgordon%2baster...@drogon.net
wrote:


Just a heads-up ... my home asterisk server is being flooded by someone
from IP 184.73.17.150 which is an Amazon EC2 instance by the looks of it -
they're trying to send SIP subscribes to one account - and they're
flooding the requests in - it's averaging some 600Kbits/sec of incoming
UDP data or about 200 a second )-:

This is much worse than anything else I've seen.

Gordon

--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
  http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users