Re: blocking irc + botnets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello

i suggest block every outbound ports on your
servers

use ip_conntrack to allow servers to answer ESTABLISHED
connections on your open ports (like 80 for a http server)

botnets or trojan downloaders can simply run on any port

a vulnerable script could be used to run a "wget ..."
command that would use outbound tcp 80, which isnt in
irc's port ranges, thats why you should simply block them all

hth

Maxime Ducharme
Programmeur / Spécialiste en sécurité réseau


----- Original Message ----- 
From: "hbeaumont hbeaumont" <ahlist@xxxxxxxxx>
To: <netfilter@xxxxxxxxxxxxxxxxxxx>
Sent: Tuesday, August 02, 2005 11:41 AM
Subject: blocking irc + botnets


Can anyone help me with the proper method to block outgoing requests to
botnets + irc?

Or point me in the direction of searchable list archives (I could only find
the non-searchable archives) or other FAQ that answers this?

Problem:

We have servers that could get infected via poorly wrote user scripts. I
want to prevent these servers from being used as part of botnets or general
connections to
IRC (most scripts I run across seem to try to connect to IRC). I want to
take the best preventative measures I can in case one of the machines would
become infected
or otherwise compromised.

Also, interested in any other popular method of stopping general outgoing
DOS attacks (rate limiting UDP perhaps? I'm not real up on the techniques
used by the DOS'ers).

I'm interested in the recommended rules to add to prevent this type of thing
should it occur. Thanks.



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux