Subj : Re: Protection
To   : Sam Penwright
From : Chris Hizny
Date : Wed Feb 02 2022 09:11 am

SP> What are you using to protect your computer and bbs
SP> like peerblock firewall, pfsense- with like a check point hardware or
SP> any other hardware? I receive a lot of hits from Russia, Korean
SP> Republic, China etc. So I thought I would see what everyone is

Well, for what it's worth, before I put up my board I was interested in what exactly these were, so using Netcat and a shell script, I made a kind of honeypot which prints a login and password prompt, logs those, then prints a fake shell prompt ($ or # depending on the attempted login).

Nearly all hits to telnet ports are bots/worms spraying-and-praying across the net, looking for -- so far as I can tell -- cheapo security cameras and other IoT devices with known default logins and passwords.  (I could determine this by watching what login/password combinations were being tried, then searching for devices with known defaults of these combinations)

Most are webcams - for some reason - with brand names they don't sell in my country - as to your comment, most are from places like China and Russia.

Once they are "logged in," nearly all of them attempt to run busybox with a payload.  Some attempt to wget the payload from an external site although for some reason those have mostly faded away.  The busybox command line assumes the payload is already baked into busybox (i.e. the device already has a compromised busybox executable).

The scripts are rather dumb; they don't check for result text or error text from the commands they run.

The larger point here is that unless you're running a system with common default logins and passwords, these present no threat to your system.  They are nuisances.

Moving your system off of the default ports completely stops them, since these scripts are looking for low-hanging fruit and targets of opportunity.  This isn't really security-through-obscurity so much as it is moving out of the way of an indiscriminately fired machine gun.

fail2ban and similar techniques are fine as far as they go but there are so many of these coming from so many different IP addresses, it's whack-a-mole. Maybe since it is automated, no big deal.

There's no real threat here.  Not that better security is a bad thing; have at it, but I figured I'd post this just to provide some additional information.

Of the ports I watch (basically everything in /etc/services), these are the most common hits (note the most hammered port -- hence the issue SysOps have to put up with):

|  Port |    Hits | Description

    23     37940   telnet
    22     27589   ssh - SSH Remote Login Protocol
   443     20170   https - http protocol over TLS/SSL
    80     18976   http www - WorldWideWeb HTTP
   123     15946   ntp - Network Time Protocol
   389      5430   ldap - Lightweight Directory Access Protocol
   111      2711   sunrpc portmapper - RPC 4.0 portmapper
    21      2465   ftp
    67      2448   bootps
    68      2291   bootpc
  1194      1687   openvpn
   873      1132   rsync

None of the ports you see in this list are open/provide services on the servers I monitor, so no one should be legitimately hitting them.

The other traffic you see are from research/scanning IPs - shodan.io is one, which are people mapping the net or searching for vulnerabilities - generally good guys (like Arbor Observatory).

Anyway slightly off-topic to your question but I hope there's something interesting in here of interest to someone.

--- Mystic BBS v1.12 A47 2021/09/24 (Linux/64)
* Origin: Shipwrecks & Shibboleths [San Francisco, CA - USA] (1:218/860)