全球主机交流论坛

 找回密码
 注册

QQ登录

只需一步,快速开始

CeraNetworks网络延迟测速工具IP归属甄别会员请立即修改密码
查看: 1702|回复: 5

用hetzner的瞧瞧看德国联邦给我发消息了

[复制链接]
发表于 2018-4-12 01:26:26 | 显示全部楼层 |阅读模式
本帖最后由 alan_1019 于 2018-4-12 01:29 编辑

我个龟龟哎,刚刚收到消息吓一跳因为又干啥子了~~要封机了~~结果没事只是警告一下,看你们拿hetzner去开站的mjj最好小心点

我是特价杜普

以下是邮件原文,部分内容以删:
  1. We received a security alert from the German Federal Office for Information Security (BSI).
  2. Please see the original report included below for details.

  3. Please investigate and solve the reported issue.
  4. It is not required that you reply to either us or the BSI.
  5. If the issue has been fixed successfully, you should not receive any further notifications.

  6. Do not reply  as this is just the sender address for the
  7. reports and messages sent to this address will not be read.

  8. Kind regards

  9. Abuse team

  10. On 11 Apr 16:23, * wrote:
  11. > Dear Sir or Madam,
  12. >
  13. > the Portmapper service (portmap, rpcbind) is required for mapping RPC
  14. > requests to a network service. The Portmapper service is needed e.g.
  15. > for mounting network shares using the Network File System (NFS).
  16. > The Portmapper service runs on port 111 tcp/udp.
  17. >
  18. > In addition to being abused for DDoS reflection attacks, the
  19. > Portmapper service can be used by attackers to obtain information
  20. > on the target network like available RPC services or network shares.
  21. >
  22. > Over the past months, systems responding to Portmapper requests from
  23. > anywhere on the Internet have been increasingly abused DDoS reflection
  24. > attacks against third parties.
  25. >
  26. > Affected systems on your network:
  27. >
  28. > Format: ASN | IP | Timestamp (UTC) | RPC response
  29. >  24940 | 略 | 2018-04-10 04:10:47 | 100000 2 111/udp; 100000 2 111/udp; 100024 1 43825/udp; 100024 1 44865/udp;
  30. >
  31. > We would like to ask you to check this issue and take appropriate
  32. > steps to secure the Portmapper services on the affected systems or
  33. > notify your customers accordingly.
  34. >
  35. > If you have recently solved the issue but received this notification
  36. > again, please note the timestamp included below. You should not
  37. > receive any further notifications with timestamps after the issue
  38. > has been solved.
  39. >
  40. > Additional information on this notification, advice on how to fix
  41. > reported issues and answers to frequently asked questions:
  42. > <https://reports.cert-bund.de/en/&gt;
  43. >
  44. > This message is digitally signed using PGP.
  45. > Information on the signature key is available at:
  46. >
复制代码

顺便看看这是多大的量看不明白~
发表于 2018-4-12 01:31:21 | 显示全部楼层
是你的机器被利用作反射攻击了.
111 NFS portmap端口.
 楼主| 发表于 2018-4-12 01:33:49 | 显示全部楼层
domin 发表于 2018-4-12 01:31
是你的机器被利用作反射攻击了.
111 NFS portmap端口.

原来如此有什么防护方法?直接封端口?
发表于 2018-4-12 01:35:31 | 显示全部楼层
嗯. 封端口
UDP 111
发表于 2018-4-12 04:08:41 | 显示全部楼层
/etc/init.d/rpcbind* stop
发表于 2018-4-12 06:59:42 来自手机 | 显示全部楼层
自己的问题,禁用想关服务,封上端口就完了
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|全球主机交流论坛

GMT+8, 2024-5-2 02:41 , Processed in 0.060290 second(s), 10 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表