[nsp-sec] Sometimes, you have to make lemon-aid.

John Fraizer john at op-sec.us
Mon Mar 3 16:45:44 EST 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


We got a MalwareURL report in last nights ASN Alerts so, ACLs were applied to filter TCP 80,443 outbound to the offending IP address and a ticket was dispatched to our
"Customer Facing" group to make customer contact.  The old adage that "the customer is always right" doesn't seem to hold true when that customer has a compromised device
and a secretary/receptionist who thinks she is smarter than you.  Here is how this has played out so far. :)


*** PHONE LOG 03/03/2008 10:39:54 AM XXXXXXXX

Applied ACL to customer interface blocking TCP 80 and TCP 443.

Filter will not be removed until this compromise is remedied.  This is taking down all HTTP and HTTPS traffic to this server.




*** STATUS CHANGE  03/03/2008 10:40:38 AM XXXXXXXX



*** NOTES 03/03/2008 04:03:55 PM XXXXXXX Action Type: Manager review
Called regarding problem. Was brushed off by secretary who stated there are no servers on site.

IP address has been filtered for the better part of the day and I see no tickets where customer has called in to XXXX or XXXX. It appears that they have not noticed their
site is down.

I cannot shut down access via customer's IAD. Though their data is compromised, there is no need to shut down voice.

Based on flows and nmap, it would appear that xxx.xxx.xxx.xxx's purpose is limited to the following ports:

PORT     STATE  SERVICE        VERSION
21/tcp   open   ftp            ProFTPD
25/tcp   open   smtp           Postfix smtpd
110/tcp  open   pop3           UW Imap pop3d 2004.89
666/tcp  open   ssh            OpenSSH 4.0 (protocol 2.0)
2000/tcp open   callbook?
5631/tcp closed pcanywheredata
8000/tcp open   http           Barracuda Spam firewall http config
8080/tcp closed http-proxy
Service Info: Host: mail; OS: Unix; Device: firewall

Sending to NOC Engineering to have ALL ports on xxx.xxx.xxx.xxx nulled.


*** STATUS CHANGE  03/03/2008 04:08:33 PM jfraizer
Happy to oblige.

#sh ip route xxx.xxx.xxx.xxx
Routing entry for xxx.xxx.xxx.xxx/30
  Known via "bgp 11456", distance 200, metric 0, type internal
  Last update from xxx.xxx.xxx.xxx 4w3d ago
  Routing Descriptor Blocks:
  * xxx.xxx.xxx.xxx, from xxx.xxx.xxx.xxx, 4w3d ago
      Route metric is 0, traffic share count is 1
      AS Hops 0

#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
jcvlfljbbg1(config)#ip route xxx.xxx.xxx.xxx 255.255.255.255 null 0 tag 80666
jcvlfljbbg1(config)#^Z
jcvlfljbbg1#sh ip route xxx.xxx.xxx.xxx
Routing entry for xxx.xxx.xxx.xxx/32
  Known via "static", distance 1, metric 0 (connected)
  Tag 80666
  Redistributing via bgp 11456
  Advertised by bgp 11456 route-map BLACKHOLE
  Routing Descriptor Blocks:
  * directly connected, via Null0
      Route metric is 0, traffic share count is 1
      Route tag 80666

Host is now blackholed.  Sending back to Security group.



*** STATUS CHANGE  03/03/2008 04:08:47 PM jfraizer



*** NOTES AND STATUS CHANGE  03/03/2008 04:16:30 PM XXXXXX Action Type: Manager review
Account flashed. Awaiting callback from qualified staff.



Now, the last thing I wanted to do was null-route the customer but, when they refuse to do anything when we contact them about something like this, they leave me no choice
and it doesn't bother me at all to use a 10-lb sledge instead of a fly-swatter.


John
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with Mandriva - http://enigmail.mozdev.org

iD8DBQFHzHGH+16lRpJszIgRAohpAJ94t7G6/fqCgr/I3+bvMaHhb8Z5kACeKYtj
uGe4eEPDqd2Az/R8ebXSVDA=
=OaEc
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list