[Clas12_software] update
Vardan Gyurjyan
gurjyan at jlab.org
Wed Dec 7 16:42:28 EST 2016
Dear All,
IT security group is still looking into the vulnerability of the Clara monitoring time-series database. As a precaution monitoring is temporarily disabled for users outside of the JLAB.
Regards,
-vardan
> On Dec 6, 2016, at 5:55 PM, Vardan Gyurjyan <gurjyan at jlab.org> wrote:
>
> Hi Cole,
> I will contact IT security tomorrow. It is ridiculous to block external IP that writes ever 5 sec. ~100Bytes of data. How we are going to monitor data acquisition and data processing from collaborating universities? Claraweb is a virtual machine outside of any imaginable firewalls. The only explanation is that they want to make sure this requests are not a security bridging attempts. Any ways I will talk to these guys and if it necessary I can make frequency of reporting below the "threshold".
> -Vardan
>
> Sent from my iPhone
>
> On Dec 6, 2016, at 5:39 PM, L Smith <lcs1956 at me.com <mailto:lcs1956 at me.com>> wrote:
>
>> Vardan,
>>
>> My IP from Norfolk was blocked on Monday by JLAB/CC. When I made a CCPR I got the first response below. At first I though it meant my normal mysql connections to clasdb.jlab.org <http://clasdb.jlab.org/> from GEMC, etc. Later Eric Hacecky sent the 2nd response below. He claims the query was repeated every 5 seconds, which is enough to trip their threshold. Apparently your claraweb dashboard was doing something they don’t like.
>>
>> I’m not sure what the next step is. I don’t want my IP banned again but I want to test your stuff.
>>
>> Thanks, Cole
>>
>>
>> **** 1st response ****
>> Your off-site IP was blocked by our IDS/IPS due to pattern matching
>> consistent with sql injection.
>>
>> In your case we know this is a false positive, and we have measures in
>> place to make sure legitimate traffic from a human is not blocked in
>> this manner. If you are running a script that makes numerous sql
>> queries in short succession please let me know.
>>
>> Traffic from the IP you listed exceeded the allowed threshold for sql
>> injection matching which triggered the block.
>>
>> I'm replying to this CCPR now to let you know the IP is unblocked.
>>
>> As this is a unique case, I have to go through the traffic to see
>> exactly which sql queries matched over what timeframe and then make
>> necessary adjustments to prevent the same behavior from your IP
>> triggering a block.
>>
>> I expect to have this in place by close of business today, so any work
>> you may need to do beyond that should not trigger a block as long as
>> the query frequency is not significantly increased.
>>
>> If you have any additional questions or concerns please let me know.
>>
>> Regards,
>> Eric Hacecky | JLab Cyber Security
>> ****
>>
>> **** 2nd response ****
>>
>> Here's the full log line I extrapolated that from.
>>
>> //
>> 1480967955.111127 70.161.227.4 49677 129.57.64.89 3000 13 GET
>> claraweb.jlab.org <http://claraweb.jlab.org/> /api/datasources/proxy/2/query?db=clara&q=SELECT
>> last("exec_time") FROM "rpafecs"."clas12" WHERE "claraSession" =~
>> /^(gurjyan-129\\.57\\.76\\.219%7000_java)$/ AND "service_name" =
>> 'DCTB' AND time > now() - 5m GROUP BY time(500ms)
>> fill(null)&epoch=ms
>> http://claraweb.jlab.org:3000/dashboard/db/pdp-b <http://claraweb.jlab.org:3000/dashboard/db/pdp-b> 1.1 Mozilla/5.0
>> (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like
>> Gecko) Version/9.1.2 Safari/601.7.7 0 16 200 OK - - HTTP::URI_SQLI
>> //
>>
>> That's the IP you provided.
>>
>> I guess the good news is, whatever you're doing with clasweb isn't
>> what's blocking the IP.
>>
>> I figure if you were sharing a connection with gurjyan you would have
>> told me by now.
>>
>> If that's not the case, the only thing I can think of is Cox assigning
>> the IP to you dynamically after he had it earlier and got it blocked.
>>
>> Let me know, otherwise you should be in the clear.
>>
>> To be on the safe side we should run a test tomorrow where you connect
>> to clasweb and I'll watch and make sure nothing is being tripped.
>>
>> Eric
>>
>> ****
>>
>>
>>
>>
>>> On Dec 6, 2016, at 11:28 AM, Vardan Gyurjyan <gurjyan at jlab.org <mailto:gurjyan at jlab.org>> wrote:
>>>
>>> This is not a critical update, and is relevant to monitoring.
>>>
>>> Release notes:
>>> - added pool size reporting for a service. This is an actual core count participating in the processing: Sebastian Mancilla
>>> - fixed bug in the Clara installer, reported by Markov N. This will prevent dangling/leftover processes.
>>>
>>> Actions:
>>>
>>> 1) stop or wait until clara reconstruction processes are done.
>>>
>>> 2) kill dangling Clara processing sessions:
>>>
>>>> ps -ef | grep java
>>> will indicate process id’s.
>>>> kill -9 <procesID>
>>>
>>> 3) update clara installation
>>>> install-claracre-clas -u
>>>
>>> P.S. at the moment I can see two dangling processes:
>>> 1) user=celentan on the node=129.57.70.18
>>> 2) user=davita on the node=129.57.70.15
>>>
>>> Regards,
>>> -vg
>>>
>>>
>>> _______________________________________________
>>> Clas12_software mailing list
>>> Clas12_software at jlab.org <mailto:Clas12_software at jlab.org>
>>> https://mailman.jlab.org/mailman/listinfo/clas12_software <https://mailman.jlab.org/mailman/listinfo/clas12_software>
> _______________________________________________
> Clas12_software mailing list
> Clas12_software at jlab.org
> https://mailman.jlab.org/mailman/listinfo/clas12_software
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.jlab.org/pipermail/clas12_software/attachments/20161207/5c12614f/attachment-0002.html>
More information about the Clas12_software
mailing list