Section One BBS

Welcome, Guest.


Subject: Re: Protection Date: Wed Feb 02 2022 09:11 am
From: Chris Hizny To: Sam Penwright

 SP> What are you using to protect your computer and bbs
 SP> like peerblock firewall, pfsense- with like a check point hardware or
 SP> any other hardware? I receive a lot of hits from Russia, Korean
 SP> Republic, China etc. So I thought I would see what everyone is

Well, for what it's worth, before I put up my board I was interested in what
exactly these were, so using Netcat and a shell script, I made a kind of
honeypot which prints a login and password prompt, logs those, then prints a
fake shell prompt ($ or # depending on the attempted login).

Nearly all hits to telnet ports are bots/worms spraying-and-praying across the
net, looking for -- so far as I can tell -- cheapo security cameras and other
IoT devices with known default logins and passwords.  (I could determine this
by watching what login/password combinations were being tried, then searching
for devices with known defaults of these combinations)

Most are webcams - for some reason - with brand names they don't sell in my
country - as to your comment, most are from places like China and Russia.

Once they are "logged in," nearly all of them attempt to run busybox with a
payload.  Some attempt to wget the payload from an external site although for
some reason those have mostly faded away.  The busybox command line assumes the 
payload is already baked into busybox (i.e. the device already has a
compromised busybox executable).

The scripts are rather dumb; they don't check for result text or error text
from the commands they run.

The larger point here is that unless you're running a system with common
default logins and passwords, these present no threat to your system.  They are 
nuisances.

Moving your system off of the default ports completely stops them, since these
scripts are looking for low-hanging fruit and targets of opportunity.  This
isn't really security-through-obscurity so much as it is moving out of the way
of an indiscriminately fired machine gun.

fail2ban and similar techniques are fine as far as they go but there are so
many of these coming from so many different IP addresses, it's whack-a-mole.
Maybe since it is automated, no big deal.

There's no real threat here.  Not that better security is a bad thing; have at
it, but I figured I'd post this just to provide some additional information.

Of the ports I watch (basically everything in /etc/services), these are the
most common hits (note the most hammered port -- hence the issue SysOps have to 
put up with):

|  Port |    Hits | Description
                                             
     23     37940   telnet
     22     27589   ssh - SSH Remote Login Protocol
    443     20170   https - http protocol over TLS/SSL
     80     18976   http www - WorldWideWeb HTTP
    123     15946   ntp - Network Time Protocol
    389      5430   ldap - Lightweight Directory Access Protocol
    111      2711   sunrpc portmapper - RPC 4.0 portmapper
     21      2465   ftp
     67      2448   bootps
     68      2291   bootpc
   1194      1687   openvpn
    873      1132   rsync

None of the ports you see in this list are open/provide services on the servers 
I monitor, so no one should be legitimately hitting them.

The other traffic you see are from research/scanning IPs - shodan.io is one,
which are people mapping the net or searching for vulnerabilities - generally
good guys (like Arbor Observatory).

Anyway slightly off-topic to your question but I hope there's something
interesting in here of interest to someone.

--- Mystic BBS v1.12 A47 2021/09/24 (Linux/64)
 * Origin: Shipwrecks & Shibboleths [San Francisco, CA - USA] (1:218/860)

Previous Message       Next Message
In Reply To: Protection (Sam Penwright)
Replies: Re: Protection (Sam Penwright)