Bonjour PascalHamboug,
Je me suis rendu dans le répertoire
/var/log
puis j’ai lancée une recherche sur toutes les fichier log (à l’exclusion des fichier “.gz”)
grep -r "unassigned.psychz.net" .
et j’ai trouve un grand paquet de lignes comme les suivantes (toutes quasiment identiques):
[quote]
./fail2ban.log.1:2014-08-16 23:03:55,923 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,926 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,929 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,936 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,939 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,943 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,946 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,948 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,949 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,951 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,954 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,957 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,958 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,961 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,964 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,967 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,971 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net
./fail2ban.log.1:2014-08-16 23:03:55,974 fail2ban.filter : WARNING Unable to find a corresponding IP address for unassigned.psychz.net[/quote]
ceci n’est qu’un court extrait … de cette attaque
effectivement ses lignes ne viennent pas d’une attaque qui vise le serveur ftp … et je pense qu’il s’agit d’une attaque DDOS bien cible pour contourner fail2ban …
Voici l’extrait d’une page web (en anglais) qui est identique à mon problème:
[quote]Dissecting the Hack - psychz.net
For some background you may want to read the Original Story leading to this write up.
The first thing that caught my attention was the fact Logwatch was reported login failures in the order of 1000’s from unassigned.psychz.net without an accompanying fail2ban email notifying me the offender had been banned.
And this as it would turn out was because the attack was clearly intended to defeat such protection methods, this is due to the logged host being unassigned.psychz.net, when the authentication failure is logged, a reverse lookup is made within vsftpd to resolve the host this PTR record returns unassigned.psychz.net, and as such is written into the log.
fail2ban then uses regex to extract the host from the logs, and attempts to make a forward lookup on unassigned.psychz.net (A/CNAME records required) to resolve the ip address, and ban the offending ip, this is where things go awry.
psychz.net maintains their own DNS servers,
DNS1.PSYCHZ.NET
DNS2.PSYCHZ.NET
These provide a PTR but no A/CNAME record, as such fail2ban can not resolve an IP and the attacking ip is left to run their attack unhindered[/quote]
et voici l’adresse de cette information :
blog.oneiroi.co.uk/hacking/disse … sychz-net/
Donc l’absence des enregistrements A/CNAME dans la configuration du DNS permet aux hackers de mener l’attaque sans soucis d’être contraint par fail2ban!
La question que je me pose maintenant c’est comment rejeter ce genre d’attaques de manière automatisée?