Unoffical empeg BBS

Quick Links: Empeg FAQ | RioCar.Org | Hijack | BigDisk Builder | jEmplode | emphatic
Repairs: Repairs

Topic Options
#319815 - 26/02/2009 18:34 Hunting a spamming computer on the network
Dignan
carpal tunnel

Registered: 08/03/2000
Posts: 12318
Loc: Sterling, VA
I just got a call from a client of mine. They say their ISP has alerted them that one of the computers on their network is sending out spam.

How do I hunt that computer down?

The computer is on a network that is merely a bunch of switches all going back to a Linksys router running Tomato with QOS turned on. I can't remember if I turned on statistics, or if that would even help.

What kind of traffic should I look out for, and how do I look out for it? Is there a way to find out the MAC address of the computer in question and block it? All the users on this network are students spread out across 4 floors and a few dozen rooms, so it's nearly impossible to go to each computer and investigate. I'm hoping that I can block the computer in question entirely, and then that student will come complaining that they don't have internet.

But how can I do that?
_________________________
Matt

Top
#319816 - 26/02/2009 18:42 Re: Hunting a spamming computer on the network [Re: Dignan]
matthew_k
pooh-bah

Registered: 12/02/2002
Posts: 2298
Loc: Berkeley, California
Spam usually flows though STMP's port 22. Tomato should let you identify which computer is spewing out emails if they're doing it while you're watching.

Once you've got a MAC address, I'm not sure if Tomato will let you block it or not.

With four floors of students going thorugh NAT, I'm amazed the RIAA/MPAA havn't come knocking at your door for reasons other than spam.


Top
#319817 - 26/02/2009 18:48 Re: Hunting a spamming computer on the network [Re: matthew_k]
hybrid8
carpal tunnel

Registered: 12/11/2001
Posts: 7738
Loc: Toronto, CANADA
Originally Posted By: matthew_k
Once you've got a MAC address, I'm not sure if Tomato will let you block it or not.


Tomato can definitely do this part. "Access Restriction" - just create a rule that applies at all times and specify that it's for a specific machine and then type in the MAC address.

The logging is going to be more difficult. You can turn on logging for outbound traffic, but it's going to get huge very quickly with that many connections. You'll want to save the log data remotely and then I suppose you can search through it for signs of the abuse.

If you're running managed switches you may want to do some of the setup before the traffic even gets to the router.
_________________________
Bruno
Twisted Melon : Fine Mac OS Software

Top
#319818 - 26/02/2009 18:53 Re: Hunting a spamming computer on the network [Re: matthew_k]
drakino
carpal tunnel

Registered: 08/06/1999
Posts: 7868
Originally Posted By: matthew_k
Spam usually flows though STMP's port 22.

SMTP is 25, SSH is port 22.

Top
#319819 - 26/02/2009 19:23 Re: Hunting a spamming computer on the network [Re: drakino]
wfaulk
carpal tunnel

Registered: 25/12/2000
Posts: 16706
Loc: Raleigh, NC US
Also check for ports 587 and 465. These are remote ports you want to look for; that is, the port being used by the remote mail server, not the port being used by the spamming client.

You should be able to find these with Tomato pretty easily. Just create a QoS classification specifying those three ports (25, 587, and 465), then "View Details" of the class you assigned them to. Not all email connections are going to be spam, so find a single computer that has a lot of connections going on.

Once you have the IP address, go to any computer on the same LAN and ping the IP address. Then run "arp -a" and find the mapping between IP and MAC. If you have disparate computers, it might be useful to discover the NIC's manufacturer.

If you had managed switches, it would be pretty easy to find the exact port the computer is connected to, but I don't know if your switches are managed.
_________________________
Bitt Faulk

Top
#319826 - 27/02/2009 04:12 Re: Hunting a spamming computer on the network [Re: wfaulk]
lectric
pooh-bah

Registered: 20/01/2002
Posts: 2085
Loc: New Orleans, LA
I do sort of the opposite. I block all traffic outgoing on 25 and make an explicit exception for the mail server. Same for all common protocols, really. Even though NAT rules aren't defined for any services, it's just too easy and prevents too many exploits not to do. Then again, I am pretty draconian in my blocking of zip files. If it's under 500k, it's blocked.

Top
#319836 - 27/02/2009 12:30 Re: Hunting a spamming computer on the network [Re: lectric]
wfaulk
carpal tunnel

Registered: 25/12/2000
Posts: 16706
Loc: Raleigh, NC US
Yeah, I try to be as unobtrusive as possible.
_________________________
Bitt Faulk

Top
#319837 - 27/02/2009 13:13 Re: Hunting a spamming computer on the network [Re: wfaulk]
hybrid8
carpal tunnel

Registered: 12/11/2001
Posts: 7738
Loc: Toronto, CANADA
I'm sure your users appreciate it. Whenever I see a gateway configured to disallow zip files I always think to myself that the admin is either too lazy to care, or they don't know what they're doing. In either cases I worry for the security of the network.

There's nothing wrong with blocking client access to port 25 completely however and using 587 instead with authentication (or even SSL). I think most ISPs around these parts have already gone at least the route of allowing mail only on 587.

But none of this is going to be relevant to Matt since I don't believe he's running a mail server. It's likely the ISP he mentioned already employs these precautions and other security measures. He needs only to find out the machine on his network responsible for the excessive mailings.

And therein lies another potential problem. Matt mentioned the ISP complained about spam, but was it based on content, quantity or both? It's going to be very difficult to isolate the responsible party if the content is spam but the quantity falls within the typical mail use for other users on his network.
_________________________
Bruno
Twisted Melon : Fine Mac OS Software

Top
#319840 - 27/02/2009 20:34 Re: Hunting a spamming computer on the network [Re: hybrid8]
lectric
pooh-bah

Registered: 20/01/2002
Posts: 2085
Loc: New Orleans, LA
Lazy isn't the word. Overworked is. Keep in mind, Not only am I in charge of the network, I'm also in charge of 450 computers, 500 voip phones, 45 copy machines, 75 fax machines, 200 printers, 17 servers, integrating our new financial package with our 20 year old financial package, installing a new security system (access control doors), etc... While at the same time fighting political struggles where morons in other departments are trying to push their data entry onto your department, and the administration is tending to agree with them.

So before you think I'm lazy, think instead that there are more important things for me to worry about than zip files, 99% of which are viruses.


Edited by lectric (27/02/2009 20:38)

Top
#319851 - 28/02/2009 02:07 Re: Hunting a spamming computer on the network [Re: hybrid8]
Dignan
carpal tunnel

Registered: 08/03/2000
Posts: 12318
Loc: Sterling, VA
Originally Posted By: hybrid8
And therein lies another potential problem. Matt mentioned the ISP complained about spam, but was it based on content, quantity or both? It's going to be very difficult to isolate the responsible party if the content is spam but the quantity falls within the typical mail use for other users on his network.

That's an excellent point. I'm not sure exactly what the ISP told them. All I was told was "someone in the building is sending spam messages." That's incredibly vague and unhelpful, but I don't blame my contacts at the facility. That's been a problem with this ISP before (Speakeasy) where they just inform us of something with no information, and tell us to take care of it. Hey, these are 80 college-aged kids. Chances are at least one of them is going to know their way around the computer enough to do what they want, but that's all it takes to bring down the connection for everyone. It would be extremely helpful to be able to identify the troublemaker.

I've told Tomato's QoS to give zero priority to bittorrent and filesharing traffic, but who knows how effective that is. I have much less of a clue how to tackle this spam issue.

But thanks for the input, everyone. I'll try to sift through it all and see if I can figure it out. I'm new to most of the world of networking. Hell, I crimped my first network cable this week for another client smile Just never had to do that before...
_________________________
Matt

Top
#319870 - 01/03/2009 10:32 Re: Hunting a spamming computer on the network [Re: Dignan]
Shonky
pooh-bah

Registered: 12/01/2002
Posts: 2009
Loc: Brisbane, Australia
Can you run tcpdump on router? "tcpdump port 25" will show all SMTP traffic. Just look for the machine sending lots...

Once you have the IP, you should be able to get a NetBIOS name and that should be enough to identify it.


Edited by Shonky (01/03/2009 10:34)
_________________________
Christian
#40104192 120Gb (no longer in my E36 M3, won't fit the E46 M3)

Top