The first one was interesting enough to justify renting the second one. The second was so bad, we don’t have any interest in the third.
Question
So what happens if, after trying every means of artistic expression – writing, music, drawing, photography – you come to the conclusion you don’t have any ideas to express?
ORLY?
Here’s what I would recommend: If you still use “admin” as a username on your blog, change it
I’m just lucky that way, I guess.
I changed it in the database as there was no way to change it in the UI. But if I’m not the only WordPress user with this problem, then what?
PS: 50 lockouts on wp-login since I installed that additional layer of security.
forensics
These two user agents make up pretty much all the brute force attempts to access the admin pages here for one day.
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 GTB5"
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0"
The full list from just one sample — yesterday — looks like this:
"Mozilla/5.0 (Windows NT 6.1; AMD64; en:16.0) Gecko/20100101 Firefox/16.0"
"Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0"
"Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.15 (KHTML, like Gecko) Chrome/24.0.1295.0 Chrome/24.0.1295.0 Safari/537.15"
"Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))"
"Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)"
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 Firefox/3.5.3 GTB5"
"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)"
"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)"
"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 7.1; Trident/5.0)"
"Mozilla/6.0 (Windows NT 6.2; WOW64; rv:16.0.1) Gecko/20121011 Firefox/16.0.1"
So I can’t really block by user agent, as I had hoped.
Notice anything in common between all of them?
None of them claim to be anything but Windows. For all I know these are actual browsers on someone’s PC running a background process, not a script with a bogus presentation. The UAs seem legit from a cursory Google search.
So I come back once more to the question: how does shutting down arbitrary ports on residential customer networks do anything to defeat this? This may seem like background noise but it’s a constant, relentless attack on the network that adds volume and congestion, which should be of concern to network providers, and puts customers at risk, which should be an issue for those customers and their network providers. It’s network abuse, at the most basic definition.
I’m sure there is enough information from various research projects, honeypots, and ad hoc stuff like this to put together a defensive strategy.
- Find the weak links, be they network providers who don’t care like the image below reveals, browsers and operating systems that are unsecured on delivery (see above: the GTB5 variant is a toolbar, I assume, and those have been linked to this kind of nonsense for years), and isolate them.
- Work with publishers and hosting companies to identify and report patterns of abuse.
- Establish a buyer’s guide to network service that monitors and publicizes poor security practices, advising both business and personal users that they may find themselves cut off from the internet if they sign on with one of these suspect providers.
For the moment, I am simply taking all the IP addresses that get caught by the login trap and adding them to a ban list. When I have a few more, perhaps I’ll sift through them to find out what netblocks/ISPs claim them and see what that reveals.
Well, apparently this is a new thing.
Right now there’s a botnet going around all of the WordPresses it can find trying to login with the “admin” username and a bunch of common passwords, and it has turned into a news story […] Most other advice isn’t great — supposedly this botnet has over 90,000 IP addresses, so an IP limiting or login throttling plugin isn’t going to be great (they could try from a different IP a second for 24 hours).
The first 24 hours
So here’s how the first day or so went of logging and blocking repeated attempts to access the login screen by brute force.
What protection against this does Comcast offer with their smtp lockdowns and block on https?
Added the Stealth Login Page Plugin as well, with the added benefit that future script kiddies will get an eyeful of sex.com on each attempt. What would be better is some site that jams a ton of bits down the pipe upon accessing a page.
the guestbook
If counting the number of requests for ‘favicon.ico’ is any guide, this site has gotten about 17.5 new visitors per day so far this year. A low of 6 and a high of 62…obviously that 62 is a huge outlier.
It’s a jungle out there
Well, look at that. One day with a plugin to lock out the script kiddies and three are logged, one blocked. Two of them are listed spammers, like this well-known one. The other is listed at Project Honeypot. Oddly, they list it as no longer active when user comments on the same page say otherwise. There should be a better way to deal with this.
and moar cleanup
One of the side-effects of owncloud is the client chatter, all those PROPFIND
attempts.
grep -c PROPF /var/log/httpd/httpd-access.log
which is about 1/4 of the log file:
2740
9438 /var/log/httpd/httpd-access.log
I have yet to decipher the right Sacred Rune that will tell me how to prevent this cruft from being logged. I’m able to ignore/not log traffic from 127.0.0.1 but cannot ignore requests for specific URI contents (like PROPFIND
requests) or by other IP addresses.
Aha. It turns out the issue was either some old stuff that was messing up the evaluation process of each request or that the IfSetEnvIF requests have to come in order. Or it just doesn’t work, as I have tested those already. Requests from 192.168.0.x networks are logged, but requests from the outside are ignored. Requests for some specified directories are not logged but others are, despite near identical config options.
SetEnvIfNoCase Request_URI "^/metrics" dontlog
SetEnvIfNoCase Request_URI "^PROPFIND" dontlog
Seems legit.
192.168.0.4 - paul [10/Apr/2013:15:38:30 -0700] "GET /cloud/status.php HTTP/1.1" 200 74
I wonder if it’s because I am authenticated?
Nope, it seems to be the menubar client (on OS X) that does that. In a browser, none of the requests are logged, even authenticated. But the little menubar gadget? Everything is logged…
What’s also interesting is that IP addresses can be used unescaped. I didn’t know that.
SetEnvIf Remote_Addr "192.168.0.4" dontlog
moar cleanup
I see a lot of garbage had crept in over the course of using different publishing platforms, editors, and other tools. I’m sure there’s a better way to do this (like a stored procedure in MySQL) but I managed to hack back a lot of the weeds with stuff like this:
mysql> UPDATE crank_posts SET post_content = REPLACE(post_content, '’','\'');
I probably spent more time trying to do this in SequelPro and wrestling with syntax, none of which was necessary: the line above works in the commandline environment. It seems to have worked once but I don’t think I saw the status message saying to: I didn’t realize it til I saw a nonsense test string staring back at me.
Just one more thing that should Just Work.
Cleanup and migration
Someone somewhere is probably documenting the best way to do this — disentangle yourself from Google’s scuttling of RSS — already…
I turned off Feedburner as the host for my feeds/syndication links. Haven’t seen yet where they appear upon the page so people can pick them up directly. I may have to turn it back on until I can figure that out.
I may as well remove AdSense as that never yields a blessed thing.
Starting experimenting with a few other things I haven’t touched in awhile…stuffing web access logs into MySQL for some kind of reporting (more than a nightly summary) is something I should have looked at ages ago. Not sure if I have logs all the way back to 2002 (!) or what I’ll have to learn about database design to make this work on my underpowered (Shuttle XPC, dual core P4 at 2.mumble gHz, 1 Gb ram — hey, it came from FreeCycle, what can I say?) server.
Reading this back reminds me that of all the lies I learned in school, the one about the key value in long term employability was the ability to learn and grow is the biggest. From what I see in the market, it means “we want people who have already learned the stuff we want on someone else’s time. We’re not interested in your ability to learn if we have to pay for it.” Buzzwords, TLAs, commoditized protocols and standards, not deep understanding or experience, rule the day.