[asterisk-users] Is this a DDoS to reach Asterisk?

Lyle Giese lyle at lcrcomputer.net
Mon Nov 8 21:44:17 CST 2010


Welcome to the Internet!

It's a fact of life when having equipment connected to the Internet. The
script kiddies are always probing and trying.

Lyle

Bruce B wrote:
> And that's the problem. There is no such service running or such port
> is not open. They only keep trying this for no reason. It might cost
> us bandwidth for no reason. In fact there is no open ports on our
> network whatsoever.
>
> Thanks
>
> On Mon, Nov 8, 2010 at 9:50 PM, Lyle Giese <lyle at lcrcomputer.net
> <mailto:lyle at lcrcomputer.net>> wrote:
>
>     Bruce B wrote:
>>     Hi Everyone,
>>
>>     I have pfSense running which supplies Asterisk with DHCP. I had
>>     some testing ports opened for a web server which I have totally
>>     closed now but when I chose option 10 (filter log) on pfSense I
>>     get all of this type of traffic (note that it was only 1 single
>>     IP and once I blocked that one it was like opening a can full of
>>     bees with all different IPs):
>>
>>
>>
>>     tcpdump: WARNING: pflog0: no IPv4 address assigned
>>     tcpdump: verbose output suppressed, use -v or -vv for full
>>     protocol decode
>>     listening on pflog0, link-type PFLOG (OpenBSD pflog file),
>>     capture size 96 bytes
>>     000000 rule 70/0(match): block in on vr1: 221.132.34.165.33556 >
>>     69.90.78.53.52229:  tcp 20 [bad hdr length 0 - too short, < 20]
>>     6. 239658 rule 70/0(match): block in on vr1: 121.207.254.227.6667
>>     > 69.90.78.38.3072:  tcp 24 [bad hdr length 0 - too short, < 20]
>>     7. 986724 rule 70/0(match): block in on vr1: 61.231.237.223.4155
>>     > 69.90.78.62.445:  tcp 28 [bad hdr length 0 - too short, < 20]
>>     2. 867707 rule 70/0(match): block in on vr1: 61.231.237.223.4155
>>     > 69.90.78.62.445:  tcp 28 [bad hdr length 0 - too short, < 20]
>>     2. 799337 rule 70/0(match): block in on vr1: 186.36.73.212.4545 >
>>     69.90.78.56.445:  tcp 28 [bad hdr length 0 - too short, < 20]
>>     2. 931814 rule 70/0(match): block in on vr1: 186.36.73.212.4545 >
>>     69.90.78.56.445:  tcp 28 [bad hdr length 0 - too short, < 20]
>>     1. 574556 rule 70/0(match): block in on vr1: 190.7.59.45.1341 >
>>     69.90.78.43.445:  tcp 28 [bad hdr length 0 - too short, < 20]
>>     2. 956066 rule 70/0(match): block in on vr1: 190.7.59.45.1341 >
>>     69.90.78.43.445:  tcp 28 [bad hdr length 0 - too short, < 20]
>>     1. 598334 rule 70/0(match): block in on vr1: 2.95.19.121.3463 >
>>     69.90.78.42.445:  tcp 20 [bad hdr length 8 - too short, < 20]
>>     072759 rule 70/0(match): block in on vr1: 123.192.177.2.54518 >
>>     69.90.78.43.445:  tcp 20 [bad hdr length 8 - too short, < 20]
>>     109451 rule 70/0(match): block in on vr1: 219.163.19.138.3723 >
>>     69.90.78.63.445:  tcp 28 [bad hdr length 0 - too short, < 20]
>>     2. 731065 rule 70/0(match): block in on vr1: 2.95.19.121.3463 >
>>     69.90.78.42.445:  tcp 16 [bad hdr length 12 - too short, < 20]
>>     159413 rule 70/0(match): block in on vr1: 123.192.177.2.54518 >
>>     69.90.78.43.445:  tcp 20 [bad hdr length 8 - too short, < 20]
>>     374293 rule 70/0(match): block in on vr1: 219.163.19.138.3723 >
>>     69.90.78.63.445:  tcp 16 [bad hdr length 12 - too short, < 20]
>>     10. 234202 rule 70/0(match): block in on vr1: 189.105.69.200.2413
>>     > 69.90.78.52.445:  tcp 20 [bad hdr length 12 - too short, < 20]
>>     2. 985558 rule 70/0(match): block in on vr1: 189.105.69.200.2413
>>     > 69.90.78.52.445:  tcp 20 [bad hdr length 12 - too short, < 20]
>>     13. 236084 rule 70/0(match): block in on vr1: 82.51.36.230.2923 >
>>     69.90.78.35.445:  tcp 16 [bad hdr length 12 - too short, < 20]
>>     2. 982122 rule 70/0(match): block in on vr1: 82.51.36.230.2923 >
>>     69.90.78.35.445:  tcp 16 [bad hdr length 12 - too short, < 20]
>>     18. 493312 rule 70/0(match): block in on vr1: 218.16.118.242.80 >
>>     69.90.78.47.39781:  tcp 16 [bad hdr length 12 - too short, < 20]
>>     2. 477084 rule 70/0(match): block in on vr1: 218.16.118.242.80 >
>>     69.90.78.47.39781:  tcp 16 [bad hdr length 12 - too short, < 20]
>>     9. 777792 rule 70/0(match): block in on vr1: 121.243.16.214.1677
>>     > 69.90.78.54.445:  tcp 16 [bad hdr length 12 - too short, < 20]
>>     1. 216002 rule 70/0(match): block in on vr1: 172.168.0.4.1568 >
>>     69.90.78.49.445: [|tcp]
>>     321600 rule 70/0(match): block in on vr1: 72.179.18.165.2854 >
>>     69.90.78.55.445:  tcp 20 [bad hdr length 8 - too short, < 20]
>>     1. 383839 rule 70/0(match): block in on vr1: 121.243.16.214.1677
>>     > 69.90.78.54.445: [|tcp]
>>     1. 466115 rule 70/0(match): block in on vr1: 72.179.18.165.2854 >
>>     69.90.78.55.445: [|tcp]
>>     7. 977140 rule 70/0(match): block in on vr1: 41.72.209.67.4532 >
>>     69.90.78.36.445: [|tcp]
>>     2. 920013 rule 70/0(match): block in on vr1: 41.72.209.67.4532 >
>>     69.90.78.36.445: [|tcp]
>>     29. 032839 rule 70/0(match): block in on vr1: 201.168.49.13.1404
>>     > 69.90.78.55.445: [|tcp]
>>     2. 996906 rule 70/0(match): block in on vr1: 201.168.49.13.1404 >
>>     69.90.78.55.445: [|tcp]
>>     62. 079279 rule 70/0(match): block in on vr1: 82.165.131.28.6005
>>     > 69.90.78.47.1024: [|tcp]
>>     34. 224871 rule 67/0(match): block in on vr1: 77.34.234.241.1899
>>     > 69.90.78.43.445: [|tcp]
>>     3. 006367 rule 67/0(match): block in on vr1: 77.34.234.241.1899 >
>>     69.90.78.43.445: [|tcp]
>>     20. 274886 rule 67/0(match): block in on vr1: 66.211.120.62.1132
>>     > 69.90.78.55.445: [|tcp]
>>     2. 893859 rule 67/0(match): block in on vr1: 66.211.120.62.1132 >
>>     69.90.78.55.445: [|tcp]
>>     28. 739620 rule 67/0(match): block in on vr1:
>>     117.197.247.151.1042 > 69.90.78.55.445: [|tcp]
>>     2. 936286 rule 67/0(match): block in on vr1: 117.197.247.151.1042
>>     > 69.90.78.55.445: [|tcp]
>>     1. 207250 rule 67/0(match): block in on vr1:
>>     118.171.176.188.42965 > 69.90.78.43.445: [|tcp]
>>     3. 015370 rule 67/0(match): block in on vr1:
>>     118.171.176.188.42965 > 69.90.78.43.445: [|tcp]
>>     7. 088359 rule 67/0(match): block in on vr1: 61.130.103.10 >
>>     69.90.78.42 <http://69.90.78.42>: [|icmp]
>>     11. 825521 rule 67/0(match): block in on vr1: 71.100.221.211.4521
>>     > 69.90.78.33.445: [|tcp]
>>     2. 316564 rule 67/0(match): block in on vr1: 61.130.103.10 >
>>     69.90.78.42 <http://69.90.78.42>: [|icmp]
>>     626845 rule 67/0(match): block in on vr1: 71.100.221.211.4521 >
>>     69.90.78.33.445:  tcp 20 [bad hdr length 8 - too short, < 20]
>>     5. 041794 rule 67/0(match): block in on vr1: 95.224.51.107.1378 >
>>     69.90.78.48.1434: UDP, length 376
>>     8. 978999 rule 67/0(match): block in on vr1: 221.132.34.165.33556
>>     > 69.90.78.53.52229: [|tcp]
>>     8. 067764 rule 67/0(match): block in on vr1: 117.22.229.187.2882
>>     > 69.90.78.36.1434: UDP, length 376
>>     7. 936396 rule 67/0(match): block in on vr1: 117.211.83.182.1919
>>     > 69.90.78.59.445: [|tcp]
>>     2. 890145 rule 67/0(match): block in on vr1: 117.211.83.182.1919
>>     > 69.90.78.59.445: [|tcp]
>>     4. 611658 rule 67/0(match): block in on vr1: 61.32.84.165.2561 >
>>     69.90.78.43.445: [|tcp]
>>     007399 rule 67/0(match): block in on vr1: 69.39.235.5.5060 >
>>     69.90.78.40.5060: SIP, length: 403
>>     2. 932101 rule 67/0(match): block in on vr1: 61.32.84.165.2561 >
>>     69.90.78.43.445: [|tcp]
>>     14. 157570 rule 67/0(match): block in on vr1: 83.239.20.74.3191 >
>>     69.90.78.54.445: [|tcp]
>>     2. 229645 rule 67/0(match): block in on vr1: 75.97.10.248.2556 >
>>     69.90.78.54.445: [|tcp]
>>     773124 rule 67/0(match): block in on vr1: 83.239.20.74.3191 >
>>     69.90.78.54.445: [|tcp]
>>     2. 102083 rule 67/0(match): block in on vr1: 75.97.10.248.2556 >
>>     69.90.78.54.445: [|tcp]
>>     6. 378646 rule 67/0(match): block in on vr1: 114.42.222.45.31689
>>     > 69.90.78.39.445: [|tcp]
>>     2. 950717 rule 67/0(match): block in on vr1: 114.42.222.45.31689
>>     > 69.90.78.39.445: [|tcp]
>>     6. 111112 rule 67/0(match): block in on vr1: 186.122.147.6.32221
>>     > 69.90.78.45.445: [|tcp]
>>     3. 608465 rule 67/0(match): block in on vr1: 186.122.147.6.32221
>>     > 69.90.78.45.445: [|tcp]
>>
>>
>>     Thanks,
>>
>     Always in cases like this find out what service might be
>     targeted.  What's on tcp port 445?  Microsoft-Directory Services
>
>     Enough said.  The script kiddies have a new tool to play with to
>     break into Microsoft based systems...
>
>     Lyle
>
>
>     --
>     _____________________________________________________________________
>     -- Bandwidth and Colocation Provided by http://www.api-digital.com --
>     New to Asterisk? Join us for a live introductory webinar every Thurs:
>                   http://www.asterisk.org/hello
>
>     asterisk-users mailing list
>     To UNSUBSCRIBE or update options visit:
>       http://lists.digium.com/mailman/listinfo/asterisk-users
>
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20101108/e9c91ba6/attachment-0001.htm 


More information about the asterisk-users mailing list