Holy hackamole, bots are a problem!

Setting up the server

This site runs on a small VPS which costs me less than a cup of coffee each month. Given I wanted to be able to precisely control my server software, PHP version, extensions, libraries, mail system etc. and I have the technical knowledge to set these things up myself, it seemed a no-brainer as the cheapest option. My TLS certificate is provided free by Let's Encrypt and updated automatically as needed.

I'm not naive, either. I've been in this industry a while, I know there are people and - more immediately and commonly - automated bots who will probe any public server for weaknesses, attempt to identify what it's running, attempt to gain access and breach every possible avenue. SSH, mail server, web server and anything else exposing a socket are fair game for targeting. Which is why it's important to make sure you know how to configure at least the basics of hardening and security on your system before it's exposed.

But my god, I did not realise just how many bots attempt to breach even a random, tiny server like mine.

In the space of one week, I accumulated 10MB of log lines just rejecting unauthorized SSH connections. That's tens of thousands of attempts. None were successful, because I've disabled root login, don't have a stupid or obvious password and only have the one user - my own account - who is allowed to authenticate. My username is also not anything common or obvious like admin, user etc. which are all the types of username tried by these bots.

Here's a small sample from the logs:

Mar 28 000228 sys sshd[52434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.21  user=root
Mar 28 000231 sys sshd[52434]: Failed password for root from 61.177.173.21 port 40640 ssh2
Mar 28 000234 sys sshd[52434]: Failed password for root from 61.177.173.21 port 40640 ssh2
Mar 28 000238 sys sshd[52434]: Failed password for root from 61.177.173.21 port 40640 ssh2
Mar 28 000240 sys sshd[52434]: Received disconnect from 61.177.173.21 port 4064011  [preauth]
Mar 28 000240 sys sshd[52434]: Disconnected from authenticating user root 61.177.173.21 port 40640 [preauth]
Mar 28 000240 sys sshd[52434]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.21  user=root
Mar 28 000318 sys auth: pam_unix(dovecot:auth): check pass; user unknown
Mar 28 000318 sys auth: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=ventas@davegebler.com rhost=144.217.126.25
Mar 28 000327 sys sshd[52437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.173.21  user=root
Mar 28 000329 sys sshd[52437]: Failed password for root from 61.177.173.21 port 58500 ssh2
Mar 28 000332 sys sshd[52437]: Failed password for root from 61.177.173.21 port 58500 ssh2
Mar 28 000335 sys sshd[52437]: Failed password for root from 61.177.173.21 port 58500 ssh2

A few IP addresses in particular, all apparently originating in China, seemed to be responsible for the majority of attempts. These are now blocked on all ports. Additionally, I now disable the SSH port entirely on the firewall except for any IP address except mine.

Completely block an IP address on Linux

To drop all incoming packets on all ports from a particular IP, run the following command, obviously replacing the IP below with the one you want to block. Bear in mind iptables rules are not persistent and you will need to save/restore them on restart.

iptables -A INPUT -s 61.177.173.21 -j DROP

But better yet, rather than maintaining iptables rules yourself, install a tool like Fail2Ban to monitor commonly targeted services and automatically block IP addresses attempting suspicious behaviour.

The web server

You cannot list the contents of a directory on my Apache installation (Options -Indexes), in fact anything that's not a static file in the public document root (images and the like) will be routed to the blog application, which will in turn serve a 404 for unrecognized URLs.

This of course hasn't stopped bots attempting to probe my server for common application-level vulnerabilities and in particular, whether it's running WordPress (it isn't). I see a lot of log entries requesting /wp-login.php and /xmlrpc.php, both of which can be used not only to detect WordPress (and maybe its specific version) but also as an entry-point for any known exploits, as well as just trying common admin username and password combinations.

Requesting paths associated with WordPress, even once, now gets you a temporary ban. It's simply not something any legitimate traffic will do on my site. I do the same for a few other particularly common HTTP attack vectors.

There are other bots which try to probe different platforms and vulnerabilities and I can't guard against everything - it's a public server, I can't really stop people requesting invalid paths.

What I can do for these other cases, though, is throttle these requests at the application level. I have a rate-limiter in place which does a few things on my site to mitigate bot activity and network abuse. One of these is if an IP makes too many requests resulting in a 404 in a short period of time, it is temporarily blacklisted and will start getting a 429 very early on in the request process, before more computationally heavy activities start to take place.

I also mandate HTTPS for my site, via redirection from HTTP and Strict-Transport-Security headers. This is mostly for my benefit when logging in to my own site (though I do have a comments form), but it is also a best-practice on any site, regardless of whether you collect sensitive information from users or not.

And the mail server

No part of an exposed system goes unprobed and unsullied by the hacker bots. There are many attempts in the logs to access my IMAP server with non-existent email addresses (again, common things like admin@, customer@ etc.)

I don't blacklist these IPs unless they're particularly persistent and bothersome (again via automated tools to monitor the traffic and respond at defined thresholds), but I do have a 5 second authentication failure delay, so at least these attempts are forced to be spread apart.


Comments

Add a comment

All comments are pre-moderated and will not be published until approval.
Moderation policy: no abuse, no spam, no problem.

You can write in _italics_ or **bold** like this.

Recent posts


Saturday 10 February 2024, 17:18

The difference between failure and success isn't whether you make mistakes, it's whether you learn from them.

musings coding

Monday 22 January 2024, 20:15

Recalling the time I turned down a job offer because the company's interview technique sucked.

musings

SPONSORED AD

Buy this advertising space. Your product, your logo, your promotional text, your call to action, visible on every page. Space available for 3, 6 or 12 months.

Get in touch

Friday 19 January 2024, 18:50

Recalling the time I was rejected on the basis of a tech test...for the strangest reason!

musings

Monday 28 August 2023, 11:26

Why type hinting an array as a parameter or return type is an anti-pattern and should be avoided.

php

Saturday 17 June 2023, 15:49

Leveraging the power of JSON and RDBMS for a combined SQL/NoSQL approach.

php