[Clas12_software] update

Vardan Gyurjyan gurjyan at jlab.org
Tue Dec 6 17:55:46 EST 2016


Hi Cole,
I will contact IT security tomorrow. It is ridiculous to block external IP that writes ever 5 sec.  ~100Bytes of data.    How we are going to monitor data acquisition and data processing from collaborating universities? Claraweb is a virtual machine outside of any imaginable firewalls.  The only explanation is that they want to make  sure this requests are not a security bridging attempts. Any ways I will talk to these guys and if it necessary I can make frequency of reporting below the "threshold".
-Vardan

Sent from my iPhone

> On Dec 6, 2016, at 5:39 PM, L Smith <lcs1956 at me.com> wrote:
> 
> Vardan,
> 
> My IP from Norfolk was blocked on Monday by JLAB/CC.  When I made a CCPR I got the first response below.  At first I though it meant my normal mysql connections to clasdb.jlab.org from GEMC, etc.  Later Eric Hacecky sent the 2nd response below.  He claims the query was repeated every 5 seconds, which is enough to trip their threshold.  Apparently your claraweb dashboard was doing something they don’t like.  
> 
> I’m not sure what the next step is.  I don’t want my IP banned again but I want to test your stuff.
> 
> Thanks, Cole
> 
> 
> **** 1st response ****
> Your off-site IP was blocked by our IDS/IPS due to pattern matching
> consistent with sql injection.
> 
> In your case we know this is a false positive, and we have measures in
> place to make sure legitimate traffic from a human is not blocked in
> this manner.  If you are running a script that makes numerous sql
> queries in short succession please let me know.
> 
> Traffic from the IP you listed exceeded the allowed threshold for sql
> injection matching which triggered the block.
> 
> I'm replying to this CCPR now to let you know the IP is unblocked.
> 
> As this is a unique case, I have to go through the traffic to see
> exactly which sql queries matched over what timeframe and then make
> necessary adjustments to prevent the same behavior from your IP
> triggering a block.
> 
> I expect to have this in place by close of business today, so any work
> you may need to do beyond that should not trigger a block as long as
> the query frequency is not significantly increased.
> 
> If you have any additional questions or concerns please let me know.
> 
> Regards,
> Eric Hacecky | JLab Cyber Security
> ****
> 
> **** 2nd response ****
> 
> Here's the full log line I extrapolated that from.
> 
> //
> 1480967955.111127	70.161.227.4	49677	129.57.64.89	3000	13	GET
> claraweb.jlab.org	/api/datasources/proxy/2/query?db=clara&q=SELECT
> last("exec_time") FROM "rpafecs"."clas12" WHERE "claraSession" =~
> /^(gurjyan-129\\.57\\.76\\.219%7000_java)$/ AND "service_name" =
> 'DCTB' AND time > now() - 5m GROUP BY time(500ms)
> fill(null)&epoch=ms
> http://claraweb.jlab.org:3000/dashboard/db/pdp-b	1.1	Mozilla/5.0
> (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like
> Gecko) Version/9.1.2 Safari/601.7.7	0	16	200	OK	-	-	HTTP::URI_SQLI
> //
> 
> That's the IP you provided.
> 
> I guess the good news is, whatever you're doing with clasweb isn't
> what's blocking the IP.
> 
> I figure if you were sharing a connection with gurjyan you would have
> told me by now.
> 
> If that's not the case, the only thing I can think of is Cox assigning
> the IP to you dynamically after he had it earlier and got it blocked.
> 
> Let me know, otherwise you should be in the clear.
> 
> To be on the safe side we should run a test tomorrow where you connect
> to clasweb and I'll watch and make sure nothing is being tripped.
> 
> Eric		
> 
> ****
> 
> 
> 
> 
>> On Dec 6, 2016, at 11:28 AM, Vardan Gyurjyan <gurjyan at jlab.org> wrote:
>> 
>> This is not a critical update, and is relevant to monitoring.
>> 
>> Release notes:
>> - added pool size reporting for a service. This is an actual core count participating in the processing: Sebastian Mancilla
>> - fixed bug in the Clara installer, reported by Markov N. This will prevent dangling/leftover processes.
>> 
>> Actions:
>> 
>> 1) stop or wait until clara reconstruction processes are done.
>> 
>> 2) kill dangling Clara processing sessions:
>> 
>>> ps -ef | grep java 
>> will indicate process id’s.
>>> kill -9 <procesID>
>> 
>> 3) update clara installation
>>> install-claracre-clas -u
>> 
>> P.S. at the moment I can see two dangling processes: 
>> 1) user=celentan on the node=129.57.70.18
>> 2) user=davita on the node=129.57.70.15
>> 
>> Regards,
>> -vg
>> 
>> 
>> _______________________________________________
>> Clas12_software mailing list
>> Clas12_software at jlab.org
>> https://mailman.jlab.org/mailman/listinfo/clas12_software
> 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.jlab.org/pipermail/clas12_software/attachments/20161206/aba3729a/attachment-0002.html>


More information about the Clas12_software mailing list