这是滥用被发警告了?也不对啊.我他么就1个站.看了下流量
本帖最后由 trips 于 2020-1-8 18:59 编辑We have received a security alert from the German Federal Office for Information Security (BSI).
Please see the original report included below for details.
Please investigate and solve the reported issue.
It is not required that you reply to either us or the BSI.
If the issue has been fixed successfully, you should not receive any further notifications.
Additional information is provided with the HOWTOs referenced in the report.
In case of further questions, please contact and keep the ticket number of the original report in the subject line. Do not reply to > as this is just the sender address for the reports and messages sent to this address will not be read.
Kind regards
Abuse Team
Hetzner Online GmbH
Industriestr. 25
91710 Gunzenhausen / Germany
Tel: +49 9831 5050
Fax: +49 9831 5053
www.hetzner.com
Register Court: Registergericht Ansbach, HRB 6089
CEO: Martin Hetzner, Stephan Konvickova, Günther Müller
For the purposes of this communication, we may save some
of your personal data. For information on our data privacy
policy, please see: www.hetzner.com/datenschutzhinweis
On 08 Jan 06:40, wrote:
> Dear Sir or Madam,
>
> NetBIOS defines a software interface and a naming convention.
> NetBIOS over TCP/IP provides the NetBIOS programming interface
> over the TCP/IP protocol.
>
> Over the past months, systems responding to NetBIOS nameservice
> requests from anywhere on the Internet have been increasingly
> abused for DDoS reflection attacks against third parties.
>
> Affected systems on your network:
>
> Format: ASN | IP | Timestamp (UTC) | Workgroup name | Machine name
>
> We would like to ask you to check this issue and take appropriate
> steps to secure the NetBIOS nameservices services on the affected
> systems or notify your customers accordingly.
>
> If you have recently solved the issue but received this notification
> again, please note the timestamp included below. You should not
> receive any further notifications with timestamps after the issue
> has been solved.
>
> Additional information on this notification, advice on how to fix
> reported issues and answers to frequently asked questions:
>
>
> This message is digitally signed using PGP.
> Information on the signature key is available at:
>
>
> Please note:
> This is an automatically generated message. Replies to the
> sender address > will NOT be read
> but silently be discarded. In case of questions, please contact
> > and keep the ticket number
> of this message in the subject line.
>
> !! Please make sure to consult our HOWTOs and FAQ available at
> !!first.
>
>
>
> Mit freundlichen Gren / Kind regards
> Team CERT-Bund
>
> Bundesamt fr Sicherheit in der Informationstechnik
> Federal Office for Information Security (BSI)
> Referat OC23 - CERT-Bund
> Godesberger Allee 185-189, 53175 Bonn, Germany
这是滥用被发警告了?也不对啊.我他么就1个站.看了下流量也正常...我也是醉了.
今天目前才4.8G?
这也发滥用警告? German Federal Office for Information Security (BSI)
... 你是干了啥?
xayle 发表于 2020-1-8 18:54
German Federal Office for Information Security (BSI)
... 你是干了啥?
sweat.gif
啥都没干.看了下好像很多收到这种的..
一个月就跑32G..我他么. 关键的邮件内容你没有贴啊。
估计是RDP漏洞通知邮件。
我隔几天就收到一次,一直没管过。
斜阳晚暮 发表于 2020-1-8 18:57
关键的邮件内容你没有贴啊。
估计是RDP漏洞通知邮件。
100天在线.宝塔统计流量还没200G..我今天第一次收到..
trips 发表于 2020-1-8 18:55
啥都没干.看了下好像很多收到这种的..
一个月就跑32G..我他么.
netbios 有漏洞, 服务器放开了这些端口, 关掉 > We would like to ask you to check this issue and take appropriate
> steps to secure the NetBIOS nameservices services on the affected
> systems or notify your customers accordingly.
trips 发表于 2020-1-8 19:01
100天在线.宝塔统计流量还没200G..我今天第一次收到..
漏洞通知,和是否已经被滥用应该没关系。
不需要回复的问题。应该都不严重,不用怎么管。 这是DD了windows系统了吧?
openos 发表于 2020-1-8 19:06
这是DD了windows系统了吧?
没.做站用的liunx的系统.. 不是滥用,大意是说netbios服务漏洞可能会被拿来做ddos让你排查一下
页:
[1]
2