Cybersecurity
DevOps Cloud (ADM)
IT Operations Cloud
There are number of publicly available lists of known IP Addresses that are currently compromised. Various sites offer these lists for free. These hosts are running crimeware with Botnets. The attacker can use these machines to launch any attack on your applications hosted at your site. The file format is very simple, so you can also handcraft this list.
You can update the list to Access Manager Configuration through Administration Console. Access Manager blocks the addresses configured in the list. This capability is already available in 4.1 release.
This tool provides another way by implementing a custom risk rule by reading the list from a text file on the disk. You can use this solution when you want to directly utilize the file downloaded off the sites which offer the blocked list service containing IP Addresses running Botnets. The Url Services are given below. Or you can handcraft a file manually.
The attached Java Jar file implements a custom Rule Evaluation logic, that checks for known list of IP addresses in a text file configured in User Interface. The file format is a simple list of IP addresses listed one per line. Comments can be added in the text file starting with character #. For example, a text file can be saved in the following format in location /opt/novell/nam/idp/data/zeus.iplist
##############################################################################
# abuse.ch ZeuS IP blocklist #
# #
# For questions please refer to https://zeustracker.abuse.ch/blocklist.php #
##############################################################################
103.230.84.239
103.241.0.100
103.26.128.84
103.4.52.150
The custom Rule checks for any modification to this file and re-creates the list in memory so that newly added IP addresses are checked immediately without a restart or Apply from Administration Console.
You can either download vulnerable list off the Internet to local machine or create your own from your intrusion detection system and your historical database. A list of known sites which offer these botnet infected sites are
https://zeustracker.abuse.ch/blocklist.php?download=ipblocklist
https://spyeyetracker.abuse.ch/blocklist.php?download=ipblocklist
https://palevotracker.abuse.ch/blocklists.php?download=ipblocklist
$ mkdir -p /opt/novell/nam/idp/data/
$ curl -s https://zeustracker.abuse.ch/blocklist.php?download=ipblocklist > zeus.iplist
$ cp net-sk-nam-rules-4.1-0.jar /opt/novell/nam/idp/webapps/nidp/WEB-INF/lib
$ /etc/init.d/novell-idp restart
Now, all the users who are trying to login into NetIQ Access Manager system will go through this new Risk Based Authentication class after regular authentication. If the client's IP address falls in this blocked list, then the authentication will be denied.
You can test/debug the result of Risk Based authentication by enabling logging in Identity Server and watching catalina.out output as described in section "https://www.netiq.com/documentation/access-manager-41/admin/data/b1dg0omz.html#b1f4rruj".
You can use the Risk Based Authentication Test Servlet to check what is the result of the rule evaluation by following the steps at "https://www.netiq.com/documentation/access-manager-41/admin/data/b1dg0omz.html#b1f4fiip"