[Info-vax] intrusion detection
Rich Jordan
jordan at ccs4vms.com
Fri Mar 13 11:44:17 EDT 2009
On Mar 13, 8:05 am, joukj <jo... at hrem.nano.tudelft.nl> wrote:
> Bill Gunshannon wrote:
> > In article <49ba3625$0$6682$703f8... at textnews.kpn.nl>,
> > joukj <jo... at hrem.nano.tudelft.nl> writes:
> >> Hi All,
>
> >> Today I get the following at the command SHOW INTRUSION:
>
> >> Intrusion Type Count Expiration Source
> >> --------- ---- ----- ---------- ------
> >> NETWORK SUSPECT 22 13-MAR-2009 11:39:19.85
> >> IUPOP3::79.121.128.74:eileen
> >> NETWORK SUSPECT 22 13-MAR-2009 11:39:19.86
> >> IUPOP3::79.121.128.74:elaine
> >> NETWORK SUSPECT 22 13-MAR-2009 11:39:19.87
> >> IUPOP3::79.121.128.74:elisabeth
> >> NETWORK SUSPECT 22 13-MAR-2009 11:39:19.88
> >> IUPOP3::79.121.128.74:elizabeth
> >> NETWORK SUSPECT 22 13-MAR-2009 11:39:19.89
> >> IUPOP3::79.121.128.74:ellen
> >> NETWORK SUSPECT 22 13-MAR-2009 11:39:19.90
> >> IUPOP3::79.121.128.74:email
> >> NETWORK SUSPECT 22 13-MAR-2009 11:39:19.90
> >> IUPOP3::79.121.128.74:emails
> >> NETWORK SUSPECT 22 13-MAR-2009 11:39:19.91
> >> IUPOP3::79.121.128.74:emanuel
> >> NETWORK SUSPECT 22 13-MAR-2009 11:47:21.80
> >> IUPOP3::79.121.128.74:emerson
> >> NETWORK SUSPECT 22 13-MAR-2009 11:47:21.81
> >> IUPOP3::79.121.128.74:emily
> >> NETWORK SUSPECT 22 13-MAR-2009 11:47:21.81
> >> IUPOP3::79.121.128.74:emma
> >> NETWORK SUSPECT 22 13-MAR-2009 11:48:02.01
> >> IUPOP3::79.121.128.74:emmanuel
> >> NETWORK INTRUDER 22 13-MAR-2009 11:24:41.45
> >> IUPOP3::79.121.128.74:encrypt
> >> NETWORK INTRUDER 22 13-MAR-2009 11:28:15.26
> >> IUPOP3::79.121.128.74:eric
> >> NETWORK SUSPECT 88 13-MAR-2009 11:39:20.16
> >> IUPOP3::79.121.128.74:gilbert
> >> etc.....
>
> >> The attack seems to come from one Ip-adress using different usernames to
> >> get access to the pop-server. Should the detection system not block
> >> the whole access from this host and not per user? As it is configured
> >> now they can keep trying to get in (and waist bandwith because the will
> >> not succeed)
>
> > One entry in your firewall stops that. You do have a firewall, right?
>
> > bill
>
> I know. Also the abuse was already reported to "computer-authorities" in
> my university in order to "stop" the abuse.
> My question was more "principle" for the next time, since at present I
> can block the "offending" Ip-address. But if the attack comes from a
> complete different network in future it will not be blocked (the pop3
> service i.e. should be open for our legal clients from outside the
> university). I was just wondering why all these offences were logged as
> "single" offences and not "bundled" as one so that a retry with another
> user-name does not help. I noticed that the SSHD form HP/TCPIP does
> probably this.
>
> Jouk
Unless something has changed in very recent versions, I'm pretty sure
one of the shortcomings of the HP POP server that comes with TCPIP
Services is that it does NOT tie in to the normal VMS security
mechanisms completely, so you can never trip actual intruder evasion.
I'm certain there have been a number of unhappy posts over these
shortcomings.
More information about the Info-vax
mailing list