Re: [psad-discuss] Using psad on the server performing the ps attack

2013-04-10 Thread Michael Rash
On Apr 10, 2013, jxz6cjc...@snkmail.com wrote:

> Some of our users are launching port scans on Internet servers.
> These users connect to our servers using ssh and openvpn. We
> obviously suspend their accounts where appropriate however I'd like
> to find a technical solution that either prevents the scan or
> discourages them (e.g. by slowing it down). Obviously psad is
> designed to be used to scan the logs of servers being attacked
> however is it possible to use it to detect port scans on the
> originating server? i.e. could I create a set of rules on our server
> that would mimic the logs generated on the receiving server and
> point psad at it?

If I understand the question correctly, it sounds like you could add a
set of logging rules to the OUTPUT chain on the originating systems and
then have psad watch these logs.  You could exempt outbound connections
to ports that you expect people to use, and use conntrack to log NEW
and/or INVALID connections to other ports.  With psad thrown into the mix,
as soon as the thresholds are tripped that psad defines as a scan, then
you can have psad apply auto blocking rules if you want.  Logging both
NEW and INVALID connections will cover nmap -sS/-sT and other scan types
like -sF.

> The best solution I have come up with is to use the 'recent' module
> but it still blocks a lot of legitimate traffic.
> 
>  # Log suspected port scanners
> iptables -A Limit_Pscan -p tcp --syn -m state --state NEW -m recent
> --name port_scan --rcheck --seconds 10 --hitcount 30 -j LOG
> --log-prefix 'PORT SCANNER(?): '
> 
> # Drop connections where packets > 29 in 10 second period.
> iptables -A Limit_Pscan -p tcp --syn -m state --state NEW -m recent
> --update --name port_scan  --seconds 10 --hitcount 30 -j DROP
> 
> # Allow and add the source address of the packet to the port_scan list
> iptables -A Limit_Pscan -p tcp --syn -m state --state NEW -m recent
> --set --name port_scan

You can do things like this, but this is more of a solution that resides
within iptables itself vs. letting psad apply its threshold and timing
logic which is typically more sophisticated than what can be readily
accomplished with such a strategy.  Since iptables logs when properly
applied to NEW and INVALID packets won't be too burdensome (i.e. not
logging every packet of an established tcp connection), I would let psad
work out what kinds of malicious behaviors are represented by these
logs.

Thanks,

--Mike

--
Precog is a next-generation analytics platform capable of advanced
analytics on semi-structured data. The platform includes APIs for building
apps and a phenomenal toolset for data science. Developers can use
our toolset for easy data analysis & visualization. Get a free account!
http://www2.precog.com/precogplatform/slashdotnewsletter
___
psad-discuss mailing list
psad-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/psad-discuss


[psad-discuss] Using psad on the server performing the ps attack

2013-04-10 Thread jxz6cjczs6
Some of our users are launching port scans on Internet servers. These 
users connect to our servers using ssh and openvpn. We obviously suspend 
their accounts where appropriate however I'd like to find a technical 
solution that either prevents the scan or discourages them (e.g. by 
slowing it down). Obviously psad is designed to be used to scan the logs 
of servers being attacked however is it possible to use it to detect 
port scans on the originating server? i.e. could I create a set of rules 
on our server that would mimic the logs generated on the receiving 
server and point psad at it?


The best solution I have come up with is to use the 'recent' module but 
it still blocks a lot of legitimate traffic.


 # Log suspected port scanners
iptables -A Limit_Pscan -p tcp --syn -m state --state NEW -m recent 
--name port_scan --rcheck --seconds 10 --hitcount 30 -j LOG --log-prefix 
'PORT SCANNER(?): '


# Drop connections where packets > 29 in 10 second period.
iptables -A Limit_Pscan -p tcp --syn -m state --state NEW -m recent 
--update --name port_scan  --seconds 10 --hitcount 30 -j DROP


# Allow and add the source address of the packet to the port_scan list
iptables -A Limit_Pscan -p tcp --syn -m state --state NEW -m recent 
--set --name port_scan


Thanks,

Jerome.
--
Precog is a next-generation analytics platform capable of advanced
analytics on semi-structured data. The platform includes APIs for building
apps and a phenomenal toolset for data science. Developers can use
our toolset for easy data analysis & visualization. Get a free account!
http://www2.precog.com/precogplatform/slashdotnewsletter___
psad-discuss mailing list
psad-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/psad-discuss