Home page logo
/

nanog logo nanog mailing list archives

Bizarre (.bz) abuse report - are we alone?
From: Jay Hennigan <jay () west net>
Date: Sun, 26 Aug 2012 19:35:54 -0700

OK, we're pretty vigilant about policing abusers on our network.  This
just showed up from "no-reply () abuse bz".  Please see my responses
inline.  Mail origin IP is from an ISP in the Netherlands.  Some
information redacted to protect the guilty.

Is this type of thing typical these days and we're just lucky so far and
behind the curve on the futility of trying to take action on reports of
network abuse?


-------- Original Message --------
Subject: Re: Illegal activity from 207.71.241.252
Date: Sun, 26 Aug 2012 19:13:39 -0700
From: Jay Hennigan <jay () west net>
To: [redacted]
CC: [redacted]

Sent to RIPE WHOIS contacts for mail origin IP [redacted].

On 8/25/12 3:29 PM, no-reply () abuse bz wrote:
We have noticed illegal activity from [redacted] aimed at one of our servers.
Please disable these brute force attempts, port scans and/or neighbour scanning technologies.

If you are not sure how to, please use Google to find more information about the SPT/DPT (source/destination port).
Alternatively, consult with your system administrator, forums, communities and any other sources of help.

PLEASE NOTE: We have replaced our own IP with 127.0.0.1 for privacy and security purposes.
The destination IP address does not matter because you should solve your exploits properly instead of nullrouting our 
IP.
With the exact time, IP address, source port and destination port you have plenty of information to address this 
issue.
Our IP address is not mentioned anywhere and there are no DNS records pointed to it - hence we know your IP address 
is being abusive.

This report isn't particularly helpful.  In fact, it in itself is
somewhat abusive of our time.

First, I had to dig through the headers of the email to find a
(hopefully) deliverable address to which I could respond.

Second, these logs seem to be two attempts to visit a website within a
very short period of time.  Two tries each on TCP 80 and TCP 443.
Hardly what most reasonable people would call a brute force attempt,
port scan, etc.  No typical exploit ports, no brute force hammering,
just an attempt to connect to a web server, retried once for 80 and 443.

Do you think it would be reasonable for us to query our customer and ask
if someone there might have fat-fingered a web address on one of 70+
workstations yesterday, or that someone at any of tens of thousands of
nameservers worldwide has fat-fingered the A record of some random website?

This report appears to be robot-generated, and deliberately designed to
make it difficult for a human to reply, being sent from a write-only
mailbox.

By masking the destination IP of a web request, you make it rather
difficult to track it down in the event that it is indeed abusive in the
first place.

NOC personnel and resources are a finite resource.  You appear to be
robo-sending abuse reports that are:

1. Sent from a write-only mailbox
2. Containing logs deliberately modified to prevent tracking the abuse
3. Depicting activity that doesn't appear to be abusive

Already, abuse departments at ISPs are generally shorthanded.  This type
of thing is even more likely to cause legitimate reports to be ignored.

If you feel that this warrants further attention, please respond with a
message that is:

1. Sent by a human being.
2. Has a deliverable reply address.
3. Demonstrates activity that indeed constitutes abuse.
4. Contains logs of the abuse sufficient for us to take action against
our customer (such as the IP address being abused, or at least the subnet).


Here are our raw firewall logs, limited to 100 lines with timezone Central European Time. There is also an timestamp 
since epoch (UNIX time).
==
[2012-08-25 01:01:30 CET] [Timestamp: 1345849290] [11883637.767804] Firewall: *TCP_IN Blocked* IN=eth0 OUT= 
SRC=[redacted] DST=127.0.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=64182 DF PROTO=TCP SPT=56463 DPT=80 WINDOW=5840 
RES=0x00 SYN URGP=0
[2012-08-25 01:01:31 CET] [Timestamp: 1345849292] [11883639.265682] Firewall: *TCP_IN Blocked* IN=eth0 OUT= 
SRC=[redacted] DST=127.0.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=44605 DF PROTO=TCP SPT=57003 DPT=80 WINDOW=5840 
RES=0x00 SYN URGP=0
[2012-08-25 01:01:38 CET] [Timestamp: 1345849299] [11883646.105990] Firewall: *TCP_IN Blocked* IN=eth0 OUT= 
SRC=[redacted] DST=127.0.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=39054 DF PROTO=TCP SPT=33537 DPT=443 WINDOW=5840 
RES=0x00 SYN URGP=0
[2012-08-25 01:01:38 CET] [Timestamp: 1345849299] [11883646.411775] Firewall: *TCP_IN Blocked* IN=eth0 OUT= 
SRC=[redacted] DST=127.0.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=37931 DF PROTO=TCP SPT=33645 DPT=443 WINDOW=5840 
RES=0x00 SYN URGP=0



-- 
--
Jay Hennigan - CCIE #7880 - Network Engineering - jay () impulse net
Impulse Internet Service  -  http://www.impulse.net/
Your local telephone and internet company - 805 884-6323 - WB6RDV




  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]