Go Back   vb.org Archive > vBulletin 3 Discussion > vB3 General Discussions

Reply
 
Thread Tools Display Modes
  #1  
Old 03-27-2007, 06:45 AM
beer4life beer4life is offline
 
Join Date: Nov 2006
Posts: 13
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default Identify IPs from DB error reports. DDoS Attack.

G'Day All,
I've spent quite some time searching for a prog to do this. Please let me know if one exists. I have extensive logs(50,000+) from the error reports listing the IPs but to do this manually seems prohibitive. If this is possible, should be possible to sort out the Zombies. I know the original perpetrator, just need to confirm the path that he uses. ICCC have been ticketed, but are reticent in giving their progress.
Kindest Regards, Bill.
Reply With Quote
  #2  
Old 03-27-2007, 07:00 AM
Marco van Herwaarden Marco van Herwaarden is offline
 
Join Date: Jul 2004
Posts: 25,415
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

How do you want to identify DDOS IP's frm the errorlogs (mails?)?

You would b typically looking at your servers netstat reports to identify the attacking IP's in a DDOS situation.
Reply With Quote
  #3  
Old 03-27-2007, 07:18 AM
beer4life beer4life is offline
 
Join Date: Nov 2006
Posts: 13
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

G'Day ,
Thanks for the rapid response, I have root access and can see the stats, also the mail queue, I have diverted the error reports rather than filling my inbox. I do have many thousands that I did let through, as well as the raw Apache logs. I would like to analyse these to isolate the Zombies and take action to report them. Sorry that's the best I can explain. I see other progs for bounced emails, surely this would only be an adaption of them.
Many Thanks and Kindest Regards, Bill.


Hi,
Just a small update,
I have 10,000+ in my inbox, 20,000 I deleted from the mail queue and Apache Log 330MBs zipped to 53MBs.
Kindest Regards, Bill.
The attack has been continuing for 8 days this time. Twice previously from the same source.
Reply With Quote
  #4  
Old 03-27-2007, 07:45 AM
Marco van Herwaarden Marco van Herwaarden is offline
 
Join Date: Jul 2004
Posts: 25,415
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

If you have no knowledge on how to identify these IP's i strongly suggest you contact your host for support on this.

Depending on the kind of DDOS attack it would have to be mitigated at a very early stage on your server (ie. before it even reaches your webserver process, or whatever process is target of the attack) or even already need to be blocked on the outer-border routers at your hosts network.

PS Psting the exact error message you get from vB might also help in identifying the problem, although a typical DDOS attack can be done without ever even reaching vBulletin.
Reply With Quote
  #5  
Old 03-27-2007, 08:15 AM
beer4life beer4life is offline
 
Join Date: Nov 2006
Posts: 13
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Many thanks for your advice,
perhaps this typical error message may explain what I mean. It gives the IP of the one trying to access the site. It may or may not be genuine. However, if I can analyse the thousands, I can pick up those that are trying many times a minute. An automated process. I hope that you can see my point, Multiple access in short periods suggests a Zombie. If I can isolate recurring IPs, then I have them.
If necessary, I'm prepared to pay some one to do this for me.
Kindest Regards, Bill.

---------------------------------------------------------This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

dbmaster@example.com
retry timeout exceeded

------ This is a copy of the message, including all the headers. ------

Return-path: <nobody@server.newfunfiles.org>
Received: from nobody by server.newfunfiles.org with local (Exim 4.63)
(envelope-from <nobody@server.newfunfiles.org>)
id 1HVey8-0004nC-4n
for dbmaster@example.com; Mon, 26 Mar 2007 02:30:00 +0000
To: dbmaster@example.com
Subject: vBulletin Database Error!
From: dbmaster@example.com
Message-Id: <E1HVey8-0004nC-4n@server.newfunfiles.org>
Date: Mon, 26 Mar 2007 02:30:00 +0000

Database error in vBulletin :

mysql_connect() [<a href='function.mysql-connect'>function.mysql-connect</a>]: User newfunfi_newfunf has already more than 'max_user_connections' active connections
/home/newfunfi/public_html/includes/class_core.php on line 273

MySQL Error :
Error Number :
Date : Monday, March 26th 2007 @ 02:30:00 AM
Script : http://www.newfunfiles.org/memberlis...oindate&pp=250
Referrer :
IP Address : 217.149.242.107
Username :
Classname : vb_database
-------------------------------------------------------------------
Reply With Quote
  #6  
Old 03-27-2007, 09:53 AM
Marco van Herwaarden Marco van Herwaarden is offline
 
Join Date: Jul 2004
Posts: 25,415
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

mysql_connect() [<a href='function.mysql-connect'>function.mysql-connect</a>]: User newfunfi_newfunf has already more than 'max_user_connections' active connections
/home/newfunfi/public_html/includes/class_core.php on line 273

Depending on how busy your site is, this could be a regular error not related to an attack.

Request your host to increase the MySQL 'max_user_connections' setting. Also what is this currently set to?
Reply With Quote
  #7  
Old 03-27-2007, 01:46 PM
beer4life beer4life is offline
 
Join Date: Nov 2006
Posts: 13
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Seems my reply went astray due to maintenance.

G'Day,
The site is closed from Admin CP , so only a few, can access the site. Even when I'm the only one , there is a high server load. Perhaps we have strayed away from the original question? How do I sort out these miscreant Zombies from the few legitimate users trying to access. To put it another way , at most I show 500/Hr users attempting to access but generate upwards of 4000 error messages per Hr. Each of which has their IP in the error message.
I hope that this clarifies my dilemma.
Kindest Regards , Bill.
Reply With Quote
  #8  
Old 03-27-2007, 02:26 PM
Marco van Herwaarden Marco van Herwaarden is offline
 
Join Date: Jul 2004
Posts: 25,415
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

4000/500 = 8 errors per user/hour, does not sound a lot if you have an error that gets hit often.

But to answer the original question, no i don't know how to filter mallicious users out of that list.
Reply With Quote
  #9  
Old 03-27-2007, 02:42 PM
Ranma2k Ranma2k is offline
 
Join Date: Dec 2001
Location: Earth
Posts: 586
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

ًwell i faced alot of DDOS before on my site
and since i only have 1 site on the server it started blocking the ip with the following command
you need to have root access :

first i get the ips using the command

netstat -an | grep :80 | awk '{print $5}' | cut -d ':' -f1 | sort | uniq -c | sort -nr


it will give a lit of the IP's with the number of connections that ip oppned the list will be like this


<Con. count> < ip >
421 254.243.21.36



What i do next is to get all the ip's that have a connection over 100 and block them
( sometime even above 50 )

then after a day or 2 i remove the block ..
worked with me and the site still standing


btw there is a script that can do this for you
you can find it there
http://blog.medialayer.com/projects-ddos-deflate/

hope that helps
Reply With Quote
  #10  
Old 03-27-2007, 03:10 PM
beer4life beer4life is offline
 
Join Date: Nov 2006
Posts: 13
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Very Many thanks, "Ranma2k",
At least you live in the real world and have suffered as I have.
I will certainly chase up your advice.
Ed Skoudis also offers some interesting reading , "Counter Hack".
Just an interesting aside, I've been able to stay alive, but not operational by using a crude , but effective ploy, diverting the error reports as well as a hardware firewall. Two previous sites I opened went down in one or two days. Am now into day 8. Must be annoying the living bejabbers out of the perpetrator. I know exactly who it is.
Kindest Regards, Bill.
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 10:59 PM.


Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2024, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.03995 seconds
  • Memory Usage 2,253KB
  • Queries Executed 11 (?)
More Information
Template Usage:
  • (1)SHOWTHREAD
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)ad_showthread_beforeqr
  • (1)ad_showthread_firstpost
  • (1)ad_showthread_firstpost_sig
  • (1)ad_showthread_firstpost_start
  • (1)footer
  • (1)forumjump
  • (1)forumrules
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (1)navbar
  • (3)navbar_link
  • (120)option
  • (1)pagenav
  • (1)pagenav_curpage
  • (1)pagenav_pagelink
  • (10)post_thanks_box
  • (10)post_thanks_button
  • (1)post_thanks_javascript
  • (1)post_thanks_navbar_search
  • (10)post_thanks_postbit_info
  • (10)postbit
  • (10)postbit_onlinestatus
  • (10)postbit_wrapper
  • (1)spacer_close
  • (1)spacer_open
  • (1)tagbit_wrapper 

Phrase Groups Available:
  • global
  • inlinemod
  • postbit
  • posting
  • reputationlevel
  • showthread
Included Files:
  • ./showthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_post_thanks.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • showthread_start
  • showthread_getinfo
  • forumjump
  • showthread_post_start
  • showthread_query_postids
  • showthread_query
  • bbcode_fetch_tags
  • bbcode_create
  • showthread_postbit_create
  • postbit_factory
  • postbit_display_start
  • post_thanks_function_post_thanks_off_start
  • post_thanks_function_post_thanks_off_end
  • post_thanks_function_fetch_thanks_start
  • post_thanks_function_fetch_thanks_end
  • post_thanks_function_thanked_already_start
  • post_thanks_function_thanked_already_end
  • fetch_musername
  • postbit_imicons
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • post_thanks_function_can_thank_this_post_start
  • pagenav_page
  • pagenav_complete
  • tag_fetchbit_complete
  • forumrules
  • navbits
  • navbits_complete
  • showthread_complete