Re: [tor-relays] significant rise in fail2ban alerts for ssh abuse

2017-08-20 Thread teor

> On 15 Aug 2017, at 02:57, Ryru  wrote:
> 
> Hi Drik, hi List
> 
> On 10.08.2017 21:34, Dirk wrote:
>> As far as I know the functionality of Fail2Ban is old. If there would be
>> a Linux distribution which enables this I would like to talk to the
>> maintainer and let him know that he at least
>> tries to read the correct abuse entry from ripe instead of bothering our
>> provider as well.
> 
> I took a look into the Fail2ban source code[0] today. Although I now
> have a better understanding of how Fail2ban works I can not really
> provide the problem source.
> 
>  * The feature that causes abuse mails is called 'complain'[1].
> 
> ...
> 
> My findings let me assume that Fail2ban itself is not necessary the
> source of our problem (increasing 22/ssh abuse mails).
> 
> Possible other problem causer could be:
>  * Fail2ban OS specific configuration files
>  * a (new?) popular Fail2ban how-to-guide which promotes the 'complain'
> configuration
>  * Maybe neither of both changed something and we just had bad luck in
> the past weeks?
> 
> Maybe someone else has real world experiences with Fail2ban and can help
> us out here?

Our experience is that our email provider took a few months to identify
Fail2ban emails as spam, and automatically delete them. We haven't seen
any since then. It's no great loss.

Perhaps there have been changes to Fail2ban that have evaded some
automated filters, or your email provider changed their spam filter
config.

T
--
Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n




signature.asc
Description: Message signed with OpenPGP
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] significant rise in fail2ban alerts for ssh abuse

2017-08-14 Thread Ryru
Hi Drik, hi List

On 10.08.2017 21:34, Dirk wrote:
> As far as I know the functionality of Fail2Ban is old. If there would be
> a Linux distribution which enables this I would like to talk to the
> maintainer and let him know that he at least
> tries to read the correct abuse entry from ripe instead of bothering our
> provider as well.

I took a look into the Fail2ban source code[0] today. Although I now
have a better understanding of how Fail2ban works I can not really
provide the problem source.

  * The feature that causes abuse mails is called 'complain'[1].

  * Since Feb 2014 Fail2ban is using a web service called abusix.com[2]
to get abuse contacts. They run a DNS based abuse contact info service,
e.g.:
Absuse Contact for example.com / 93.184.216.34 looks like this:
$ dig +short TXT 34.216.184.93.abuse-contacts.abusix.org

  * As response they provide one abuse mail contact, which is in our
case always our ISPs abuse address. abusix.com in turn gets their
information from the RIPE API[3]. e.g.:
curl
https://stat.ripe.net/data/abuse-contact-finder/data.json?resource=93.184.216.34

This answers the question of why Fail2ban is using our ISPs abuse
contact instead of only ours. It also answers the question how they get
this abuse contact.
But in all those samples the abuse notice was sent to our ISPs abuse
contact and to ours. So far I can not say why they use both contacts.
From checking the source I can not find the whois lookup that would
parse our abuse contact out of our RIPE object record.

I also checked the commit history for the following keyword:
  abuse: last occurrence 19. Feb 2014
  whois: last occurrence 27. Mar 2015
  mail : nothing related in the last two years

My findings let me assume that Fail2ban itself is not necessary the
source of our problem (increasing 22/ssh abuse mails).

Possible other problem causer could be:
  * Fail2ban OS specific configuration files
  * a (new?) popular Fail2ban how-to-guide which promotes the 'complain'
configuration
  * Maybe neither of both changed something and we just had bad luck in
the past weeks?

Maybe someone else has real world experiences with Fail2ban and can help
us out here?

I posted all this to the list in the hope they will help someone else in
the future.

Regards
Pascal


[0] https://github.com/fail2ban/fail2ban
[1]
https://github.com/fail2ban/fail2ban/blob/0.11/config/action.d/complain.conf
[2]
https://github.com/fail2ban/fail2ban/commit/31f4ea59cb86fb91221778902b7e6776c53553f5
[3] https://github.com/fail2ban/fail2ban/issues/612
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] significant rise in fail2ban alerts for ssh abuse

2017-08-10 Thread Duncan
This is not any kind of evidence to suggest a rise in abuse mails 
resulting from fail2ban.


Keepyourprivacy:

I can‘t talk about the source, but there are indeed more and more
script kiddies out there who use Tor or VPNs just to test around. They
hook up Linux Kali and thinking they are becoming the next big hacker.
I‘ve read from another provider which supports tor exit, that they
only accept exits if mail, irc and ssh ports are blocked, because they
are the biggest vectors for abuse messages. So i guess you are not
alone...


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] significant rise in fail2ban alerts for ssh abuse

2017-08-10 Thread Dirk
Hello,

maybe I expressed it wrong. We are quite used to the usual abuse mails
based on ssh brute forcing since we have several years of operation with
several exits out of Switzerland.
The astonishing thing is that now every one seems to have an Fail2Ban
configuration which does automatic abuse response to the abuse box and
the network operator abuse address.

I rather think this is driven by a software release which does a lot of
this automatic or semi automatic. And I would like to find the
maintainer and convince him only to write to the offical abuse email
address than additionally to the network operator.

Any hint where this improved fail2ban config comes from is welcome.

best regards

Dirk



On 10.08.2017 22:15, Keepyourprivacy wrote:
> I can‘t talk about the source, but there are indeed more and more
> script kiddies out there who use Tor or VPNs just to test around. They
> hook up Linux Kali and thinking they are becoming the next big hacker.
> I‘ve read from another provider which supports tor exit, that they
> only accept exits if mail, irc and ssh ports are blocked, because they
> are the biggest vectors for abuse messages. So i guess you are not
> alone...
>
>
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] significant rise in fail2ban alerts for ssh abuse

2017-08-10 Thread Zack Weinberg
On Thu, Aug 10, 2017 at 4:15 PM, Keepyourprivacy
 wrote:
> I can‘t talk about the source, but there are indeed more and more script
> kiddies out there who use Tor or VPNs just to test around. They hook up
> Linux Kali and thinking they are becoming the next big hacker. I‘ve read
> from another provider which supports tor exit, that they only accept exits
> if mail, irc and ssh ports are blocked, because they are the biggest vectors
> for abuse messages. So i guess you are not alone...

I also got endless complaints about port scans until I removed port 22
from cmutornode's exit policy.  Tried turning it back on a few times,
and the complaints started up again immediately.  It's sad, because
ssh-over-tor is actually quite valuable.

zw
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] significant rise in fail2ban alerts for ssh abuse

2017-08-10 Thread Keepyourprivacy
I can‘t talk about the source, but there are indeed more and more script 
kiddies out there who use Tor or VPNs just to test around. They hook up Linux 
Kali and thinking they are becoming the next big hacker. I‘ve read from another 
provider which supports tor exit, that they only accept exits if mail, irc and 
ssh ports are blocked, because they are the biggest vectors for abuse messages. 
So i guess you are not alone...___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] significant rise in fail2ban alerts for ssh abuse

2017-08-10 Thread Dirk
Dear all,

we receive a significant rise of ssh login abuse mails which reach us
and unfortunately our providers.
By significant I mean an amount that starts flooding our abuse inbox.

All abuse emails are structured the same way and point to Fail2Ban as
originator.

Do we have just bad luck and someone uses our severs to brute force all
of SSH out there OR is there a new Fail2Ban or Linux distribution
release which fosters or enables this fail2ban abuse mails be default ?

As far as I know the functionality of Fail2Ban is old. If there would be
a Linux distribution which enables this I would like to talk to the
maintainer and let him know that he at least
tries to read the correct abuse entry from ripe instead of bothering our
provider as well.

For a limited time we will now reject port 22. But really do not like
this solution. I would rather like to find out the source of this rise
in numbers.

best regards

Dirk

Example 1 
Dear Sir/Madam,

We have detected abuse from the IP address 1.1.1.x, which according to a whois 
lookup is on your network. We would appreciate if you would investigate and 
take action as appropriate.

Log lines are given below, but please ask if you require any further 
information.

(If you are not the correct person to contact about this please accept our 
apologies - your e-mail address was extracted from the whois record by an 
automated process. This mail was generated by Fail2Ban.)

Note: Local timezone is +0300 (MSK)
Aug  6 08:35:23 srv sshd[3534]: Invalid user admin from 1.1.1.x
Aug  6 08:35:25 srv sshd[3534]: Failed password for invalid user admin from 
1.1.1.x port 50789 ssh2
Aug  6 08:35:25 srv sshd[3534]: Connection closed by 1.1.1.x [preauth]
Aug  6 12:26:03 srv sshd[28169]: Invalid user admin from 1.1.1.x
Aug  6 12:26:05 srv sshd[28169]: Failed password for invalid user admin from 
1.1.1.x port 35677 ssh2
Aug  6 12:26:06 srv sshd[28169]: Connection closed by 1.1.1.x [preauth]


Example 2 
Dear Sir/Madam,

We have detected abuse from the IP address 1.1.1.x, which according to a whois 
lookup is on your network. We would appreciate if you would investigate and 
take action as appropriate.

Log lines are given below, but please ask if you require any further 
information.

(If you are not the correct person to contact about this please accept our 
apologies - your e-mail address was extracted from the whois record by an 
automated process. This mail was generated by Fail2Ban.)

Note: Local timezone is +0200 (CEST)
Aug  7 17:41:14 vps3xxx sshd[32746]: Invalid user admin from 1.1.1.x
Aug  7 17:41:14 vps3xxx sshd[32746]: pam_unix(sshd:auth): authentication 
failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.1.1.x
Aug  7 17:41:16 vps3xxx sshd[32746]: Failed password for invalid user admin 
from 1.1.1.x port 60497 ssh2
Aug  7 17:41:16 vps3xxx sshd[32746]: Connection closed by 1.1.1.x port 60497 
[preauth]

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays