全球主机交流论坛

标题: 用hetzner的瞧瞧看德国联邦给我发消息了 [打印本页]

作者: alan_1019    时间: 2018-4-12 01:26
标题: 用hetzner的瞧瞧看德国联邦给我发消息了
本帖最后由 alan_1019 于 2018-4-12 01:29 编辑

我个龟龟哎,刚刚收到消息吓一跳因为又干啥子了~~要封机了~~结果没事只是警告一下,看你们拿hetzner去开站的mjj最好小心点

我是特价杜普

以下是邮件原文,部分内容以删:
  1. We received a security alert from the German Federal Office for Information Security (BSI).
  2. Please see the original report included below for details.

  3. Please investigate and solve the reported issue.
  4. It is not required that you reply to either us or the BSI.
  5. If the issue has been fixed successfully, you should not receive any further notifications.

  6. Do not reply  as this is just the sender address for the
  7. reports and messages sent to this address will not be read.

  8. Kind regards

  9. Abuse team

  10. On 11 Apr 16:23, * wrote:
  11. > Dear Sir or Madam,
  12. >
  13. > the Portmapper service (portmap, rpcbind) is required for mapping RPC
  14. > requests to a network service. The Portmapper service is needed e.g.
  15. > for mounting network shares using the Network File System (NFS).
  16. > The Portmapper service runs on port 111 tcp/udp.
  17. >
  18. > In addition to being abused for DDoS reflection attacks, the
  19. > Portmapper service can be used by attackers to obtain information
  20. > on the target network like available RPC services or network shares.
  21. >
  22. > Over the past months, systems responding to Portmapper requests from
  23. > anywhere on the Internet have been increasingly abused DDoS reflection
  24. > attacks against third parties.
  25. >
  26. > Affected systems on your network:
  27. >
  28. > Format: ASN | IP | Timestamp (UTC) | RPC response
  29. >  24940 | 略 | 2018-04-10 04:10:47 | 100000 2 111/udp; 100000 2 111/udp; 100024 1 43825/udp; 100024 1 44865/udp;
  30. >
  31. > We would like to ask you to check this issue and take appropriate
  32. > steps to secure the Portmapper services on the affected systems or
  33. > notify your customers accordingly.
  34. >
  35. > If you have recently solved the issue but received this notification
  36. > again, please note the timestamp included below. You should not
  37. > receive any further notifications with timestamps after the issue
  38. > has been solved.
  39. >
  40. > Additional information on this notification, advice on how to fix
  41. > reported issues and answers to frequently asked questions:
  42. > <https://reports.cert-bund.de/en/&gt;
  43. >
  44. > This message is digitally signed using PGP.
  45. > Information on the signature key is available at:
  46. >
复制代码

顺便看看这是多大的量看不明白~
作者: domin    时间: 2018-4-12 01:31
是你的机器被利用作反射攻击了.
111 NFS portmap端口.
作者: alan_1019    时间: 2018-4-12 01:33
domin 发表于 2018-4-12 01:31
是你的机器被利用作反射攻击了.
111 NFS portmap端口.

原来如此有什么防护方法?直接封端口?
作者: domin    时间: 2018-4-12 01:35
嗯. 封端口
UDP 111
作者: funders    时间: 2018-4-12 04:08
/etc/init.d/rpcbind* stop
作者: tomcb    时间: 2018-4-12 06:59
自己的问题,禁用想关服务,封上端口就完了




欢迎光临 全球主机交流论坛 (https://443502.xyz/) Powered by Discuz! X3.4