You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Outrage Outage again...
2006-04-07
Yesterday's outage was courtesy of bvoe.de (195.243.0.0/16 and 62.156.0.0/15), in Munich, who decided to send a continuous stream of queries to Thugburg for Abu Musab Zarqawi. Give them a big finger hand.
Another nominee for the Richard Cranium Award.
Followup:

I've blocked their access to the site, but they're hitting port 80 multiple times a second, trying to get in, from both servers. You should be able to get in without problem at rantburg.com:81 or rantburg.com:8080. Connecting to wotresearch.com (but without a port number) will also take you there.
Posted by:Fred

#56  Bullshit! You are a cocksucker and a fucking pimp.

Since 9-11: only 1 person per day has died at the hands of a terrorist. Does that justify the $500,000,000,000 costs?

You cockroaches are the fucking trolls. Don't eat your children you wild pigs.
Posted by: .com   2006-04-07 18:42  

#55  ***
Posted by: Conservative Dining   2006-04-07 16:52  

#54  [This comment not actually posted by RB regular]
Posted by: .com   2006-04-07 16:58  

#53  Suddenly, I don't have anything to say.
Posted by: Yusef Islam   2006-04-07 13:20  

#52  Suddenly, I got nothin' to say.
Posted by: Yusef Islam   2006-04-07 05:46  

#51  Hi Bombay,

I don't do VPN so haven't had probs that I notice. TZ-170 is slow compared to others that cost more (packets processed/sec, yes?) but bang for buck is good all things considered for single server if not a bank. If Fred isn't doing VPN (Fred please correct), and is only doing this server, with those constraints (correctable by Fred) what is best then? I am ALWAYS willing to listen to others solutions who have same probs, and only want to help Fred here.
Posted by: Whiskey Mike   2006-04-07 22:28  

#50  To be honest, we had to ditch SonicWall in favor of Cisco because of problems with a full time VPN we needed to establish with LM (Lockheed). Security and Performance were far better as a side benifit, though cost was pretty high compared.

Anyway, you might want to look at PIX (there are some issues, but you can take care of easily via rules and proper setup). If you are considering a swap or addition give it a consider and let me know as I got some great vendors who can get you a deal on minimially used (ie. 6 months).
Posted by: bombay   2006-04-07 21:37  

#49  TZ-170. Good enough, usually. If anyone knows of better, specify. How much do you need?
Posted by: Whiskey Mike   2006-04-07 20:26  

#48  It wasn't a Sonic Wall. I cheaped out.
Posted by: Fred   2006-04-07 19:48  

#47  Fred,

I related the port attack problems to the brother-inlaw [the best I could].

He said bombays approach would work in most instances but that it would depend on the seriousness of the attack, you may eventually need a SonicWALL packet-filtering Gateway...

but if memory serves you purchased one a few months ago correct?
Posted by: RD   2006-04-07 19:34  

#46  do wild pigs eat their children?
Posted by: 2b   2006-04-07 19:22  

#45  He's just killing time before meeting with his probation officer. Obviously another Religion of Peace-phyllic pedophile.
Posted by: ed   2006-04-07 19:17  

#44  I think his blood pressure is rising. Let's see if the moderators can make it pop his head off.
Posted by: Darrell   2006-04-07 19:03  

#43  LtD, right? Posting from a court library in B.C.?

Posted by: SA4511   2006-04-07 18:59  

#42  
Redacted by moderator. Comments may be redacted for trolling, violation of standards of good manners, or plain stupidity. Please correct the condition that applies and try again. Contents may be viewed in the
sinktrap. Further violations may result in
banning.
Posted by: .com   2006-04-07 18:42  

#41  One ping, Vasily.

Just 1.
Posted by: anonymous2u   2006-04-07 18:39  

#40  Just to make clear, the '.com' above isn't THE .com. Just a troll trying to be clever.
Posted by: lotp   2006-04-07 18:37  

#39  Full sinktrap today.
Must have something to do with free speech advocating supressive lefty moonbat sun spot activity.
Posted by: wxjames   2006-04-07 18:02  

#38  Send a nasty message to Deutche Telecom. The Germans have nasty laws about this kind of sh$$. They also have the option of pressing legal charges and HEAVY billing costs (EU3000/min) to someone doing this. They also have the NEED to put a stop to this, because it reflects badly upon them and their clients. Who knows, they may even decide to mirror your site for a year for free to recompense you for your troubles. Or, they might decide you're a nuisance and ignore you. If the latter happens, wait until you're hit again, and report it and DT GMBH refusal to do anything to the German government. SH$$ will REALLY happen, then. Oh, and they'll do the investigating to see if it's more than just a routine DoS attack.
Posted by: Old Patriot   2006-04-07 15:22  

#37  Yuseless islame gets the fleas of a thousand camels award.
Posted by: Inspector Clueso   2006-04-07 13:50  

#36  I banned Thessaloniki
Sounds like a first person tell all or an Ouzo Punk song.
Posted by: 6   2006-04-07 12:45  

#35  I'm considering him a bad bot, rather than a DOS. I've seen him before, before I learned how to use IP Tables. He and a machine out of U. of Thessaloniki were the reason I had Thugburg closed down before. I reopened it after I banned Thessaloniki.
Posted by: Fred   2006-04-07 12:24  

#34   A good explaination of what is happening here.
I don't think it is those two sites (bvoe.de).
Symptoms sound like a reflection attack. See the link above for an explaination.
In a reflection attack you point to a null site, closed sockets or whatever as yourself.
(HE DID IT -->)
Posted by: 3dc   2006-04-07 12:11  

#33  trailing wife, "ping" is a Unix operating system term that describes one user port sending out a signal to detect if another specific port address on the system (or internet) is functioning / available. It comes from the old sonar term for bouncing acoustic signals off of an underwater object and looking for reflected signals in order to determine range and heading.

Some definitions: (from the e blogger site)

ACK /ak/ interj.
[from the ASCII mnemonic for 0000110]
1. Acknowledge. Used to register one's presence (compare mainstream *Yo!*). An appropriate response to {ping} or {ENQ}.


The opposite of ACK would be NAK or "not acknowledge".
Posted by: Zenster   2006-04-07 12:10  

#32  Should this be reported to the relevent authorities? I mean this guy sure seems like a Zealot of some sort, the Osamanaut type. lol wouldnt it be funny if you read in a few years about the man they caught meddling with net sites and now sits in Gauntanamo Bay ,lol.
Posted by: ShepUK   2006-04-07 11:01  

#31  look at the large amount of traveling this guy does.

These poor oppressed muslims are real globe trotters !
Posted by: jim#6   2006-04-07 10:24  

#30  Thanks for the reminder, 49Pan. I just dropped $20. It's not enough by a long shot, but hope it helps.

Fred, have I mentioned that not only are you a mensch, you are a GOD!? ;-p
Posted by: Barbara Skolaut   2006-04-07 10:05  

#29  Time to hit the paypal site here. Hope it helps.
Posted by: 49 Pan   2006-04-07 09:29  

#28  That sounds like it might be a good solution. I'll look into it over the weekend.
Posted by: Fred   2006-04-07 09:26  

#27  Here is an example, ironic actually, but geektools had problems with their WhoIS DB being DoS and used for malicious reasons. They've recently gone to an image generator. Anyway, you can see what I am talking about in action here :

http://www.geektools.com/whois.php
Posted by: bombay   2006-04-07 09:21  

#26  Don't need to do that (user, pass, seurity), one little 4 or 3 char image generator is all that is needed.

The system generates an image with a word in it as part of the image, not text.

Humans can read this, and enter the word / chars. Bots cannot. Each time the search page is rendered, a new word is generated in the image.

The user then enters the word/chars generated plus their search params. This will kill DB DoS attacks in their tracks.

Another huge plus, Fred, will NOT have to maintain a user security module (passwords, etc).

These image generators are well known and proven to stop these types of attacks.
Posted by: bombay   2006-04-07 09:17  

#25  I'm an amature at this but it seems you keep getting hit on the search end of the site, Thugburg etc... Password protect that part of your site and charge us to use it. Might stop the trolls from attacking.
Posted by: 49 Pan   2006-04-07 09:12  

#24  Fred,
Your site is the finest and most complete open source site out there. Thats why they are after you. Hang in there, we need your services here.
Posted by: 49 Pan   2006-04-07 09:09  

#23  You should probably look at publish through proxy and/or packet filtering on your FW / DMZ.

Ultimatley you are going to have to use one of those sentinel generators, as RB allows query direct from web. We all know these, basically generates a random image with text in it, when you search you put that text string in and your params.

I doubt this is too much impact to real users of the site, as when a Human searches for something they really mean it, the bots are just trying DB / Connection DoS attack.

Anyway, you add the image generator to your search logic and this mostly goes away.
Posted by: bombay   2006-04-07 09:03  

#22  I wouldn't block off at the country level, either Germany (TGA) or France (JFM): They're the poor people who NEED the information you provide and the insights we provide on this wonderful site of yours, Fred. Many, many thanks. Do know that you have an influence wider than you imagine.

That's WHY they are going after you.
Posted by: Ptah   2006-04-07 08:25  

#21  You must bedoing something awfully good for these folks to try so hard to stop it.
Posted by: Nimble Spemble   2006-04-07 08:01  

#20  Flatterer! ;-)
Posted by: trailing wife   2006-04-07 07:40  

#19  Pinging is geek for "change in life." You're far to junior to experience pinging.
Posted by: Besoeker   2006-04-07 07:29  

#18  What is pinging, and how would I know if it happened to me?
Posted by: trailing wife   2006-04-07 07:09  

#17  The hit counter shows the current IPs onbord, does anyone else get pinged at RB besides me?

I was pinged a few days ago.
Posted by: 2b   2006-04-07 02:46  

#16  
role: Deutsche Telekom LIR Role Account
address: Deutsche Telekom AG
address: Internet Services
a bit more,

195.243.0.0/16
resolved to

195.243.0.0 - 195.243.255.255

address: Ammerlaender Heerstrasse 138
address: DE 26129 Oldenburg
address: Germany
phone: +49 441 234 4501
fax-no: +49 441 234 4589
e-mail: lir.nic@t-com.net
Posted by: RD   2006-04-07 02:20  

#15  for an amateur thats my best shot, LOL!

mods plz delete as needed thanks.
Posted by: RD   2006-04-07 02:11  

#14  62.156.0.0/15 resolved to


62.159.255.224 - 62.159.255.255
netname: MIMATIC-ZETTL-NET
descr: Zettl GmbH CNC Praezisiions- und Sonderwerkzeuge
country: DE
admin-c: TS20391-RIPE
tech-c: TS20391-RIPE
status: ASSIGNED PA
mnt-by: DTAG-NIC
source: RIPE # Filtered
person: Thomas Sraega
address: Zettl GmbH CNC Praezisiions- und Sonderwerkzeuge
address: Westendstr. 3
address: 87488 Betzigau
address: GERMANY
phone: +498315744456
fax-no: +498315744494
e-mail: edv@mimatic-zettl.de
nic-hdl: TS20391-RIPE
mnt-by: DTAG-NIC
source: RIPE # Filtered
% Information related to '62.156.0.0/14AS3320'
route: 62.156.0.0/14
descr: Deutsche Telekom AG, Internet service provider
origin: AS3320
member-of: AS3320:RS-PA-TELEKOM
mnt-by: DTAG-RR
source: RIPE # Filtered
Posted by: RD   2006-04-07 02:09  

#13  domain: mayang.com
owner: william smith
organization: william owen smith
email: domainadmin@willsmith.org
address: the laurels
address: little bourton
city: banbury
state: oxon
postal-code: ox17 1rq
country: GB
phone: +44 1295 750000
admin-c: domainadmin@willsmith.org#0
tech-c: domainadmin@willsmith.org#0
billing-c: domainadmin@willsmith.org#0
nserver: b.ns.joker.com 159.25.97.69
nserver: c.ns.joker.com 207.44.185.10
nserver: a.ns.joker.com 194.176.0.2
status: lock
created: 2000-04-13 10:53:31 UTC
modified: 2005-06-17 18:20:07 UTC
expires: 2010-04-13 10:53:31 UTC

contact-hdl: domainadmin@willsmith.org#0
person: will smith
email: domainadmin@willsmith.org
address: the laurels
address: little bourton
city: banbury
state: --
country: GB
phone: +44 1295 750000

source: joker.com live whois service
query-time: 0.040898
db-updated: 2006-04-07 05:47:11
NOTE: By submitting a WHOIS query, you agree to abide by the following
NOTE: terms of use: You agree that you may use this data only for lawful
NOTE: purposes and that under no circumstances will you use this data to:
NOTE: (1) allow, enable, or otherwise support the transmission of mass
NOTE: unsolicited, commercial advertising or solicitations via direct mail,
NOTE: e-mail, telephone, or facsimile; or (2) enable high volume, automated,
NOTE: electronic processes that apply to Joker.com (or its computer systems).
NOTE: The compilation, repackaging, dissemination or other use of this data
NOTE: is expressly prohibited without the prior written consent of Joker.com.


Posted by: RD   2006-04-07 01:48  

#12  Don't give the bastards the satisfaction, Fred.
Posted by: Iblis   2006-04-07 01:43  

#11  3dc still on board?

195.243.0.0/16
resolved to 195.243.0.0 - 195.243.255.255

195.243.0.0 - 195.243.255.255
org: ORG-DTA2-RIPE
netname: DE-TELEKOM-971222
descr: Provider Local Registry
country: DE
admin-c: DTAG-RIPE
tech-c: DTAG-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-lower: DTAG-NIC
mnt-routes: DTAG-RR
source: RIPE # Filtered
organisation: ORG-DTA2-RIPE
org-name: Deutsche Telekom AG
org-type: LIR
address: Ammerlaender Heerstrasse 138
address: D-26129
address: Oldenburg
address: Germany
Posted by: RD   2006-04-07 01:43  

#10  of course you could attempt to convince all your users to use a real abnormal port like 8081 and block off all others.
Posted by: 3dc   2006-04-07 01:35  

#9  http://fixingtheweb.com/
to block countries and problem areas in linux

"ip-to-country" database file from ip-to-country.webhosting.info or the "geoip" database file from www.maxmind.com.
Posted by: 3dc   2006-04-07 01:28  

#8  Fred my brother in law builds servers with various operating systems for businesses and data folks. I'll call him tomorrow or drive over and ask him about IP port attacks and what can be done. 'puters and software are *NOT* my field of expertise.
..........
The hit counter shows the current IPs onbord, does anyone else get pinged at RB besides me?
Posted by: RD   2006-04-07 01:26  

#7  Drop all requests from all German and French IP Blocks. To bad a few have to wreck it for everyone but that tough for the Germans and French.
Posted by: SPoD   2006-04-07 01:14  

#6   In all seriousness, if there are any particularly notorious folks who keep popping up, drop me an e-mail and I'll see if there's anything I can do.
Posted by: Dan Darling   2006-04-07 01:10  

#5  One place that site visits a lot (other than the ones on the o-club) is:
http://www.mayang.com/

This guy has his wedding photos on the site. He is a Malaysian Muslim (gathered from the burka and styles)

look at the large amount of traveling this guy does. Although they may be visiting him for "TEXTURE FILES". Textures would make great "PADS" for encryption...

September - October 2005
Will and Mayang went to Denmark, Norway and Sweden


June 2005
Will and Mayang went to the Glastonbury Festival


June 2005
Mayang visited France


April 2005
Mayang visited Portugal


October 2004
We visited Morocco and spent some time in the Sahara


August 2004
We visited Thailand, Cambodia (including Angkor Wat) and Vietnam.


June 2004
We visited Sarawak, East Malaysia. See the pictures.


June 2004
We visited Sabah and climbed Mount Kinabalu. See the pictures.


May 2004
Our texture web site is now very popular. Statistics show that over 2000 people each day visit to download textures!


August 2003
We visited England again. See the pictures.

I think somebody should be profiling those servers and doing social network analysis on those servers... (HINT TO NSA)


Posted by: 3dc   2006-04-07 01:08  

#4  Not much. I've literally been fighting this battle for a couple years.
Posted by: Fred   2006-04-07 01:07  

#3   Little shitheads.

Anything we can do to help out, Fred?
Posted by: Dan Darling   2006-04-07 00:56  

#2  Nights like this, I think seriously of closing up shop. I used to have a life...
Posted by: Fred   2006-04-07 00:54  

#1  I'm sorry that you constantly have to deal with these folks. Thanks for staying on top of it and keeping the 'burg open.
It's very much appreciated.
Jan
Posted by: Jan   2006-04-07 00:53  

00:00