− A CIDR IP range with at least 16 addresses with unrestricted access at the
institution firewall.
− Definition of the participants of the Project’s discussion list. All must have a PGP
key to read summaries.
The next step was to set aside a machine with the following configuration:
− AMD Athlon XP 1900+ 1.6 GHz;
− 256 MB RAM memory;
− IDE hard disk with 40 GB;
− VIA VT86c100A Rhine-II PCI NIC;
− LG 52x CD-ROM drive.
Considering the access control to the hardware, it was defined that the machine
would be installed in a UnB laboratory so that it would be under vigilance most of the
time. The IP range was reserved, separated in a VLAN to avoid the excessive
broadcast packages. One of the IP addresses would be used as the machine’s real IP
and the others would be configured as virtual honeypots. It was observed that the IP
range wasn’t being filtered by the laboratory’s firewall.
For the institution to become part of the Alliance, it was necessary to define a
designation to the honeypot, identifying it at the summaries sent to the discussion list.
As the possibility of another honeypots to be installed in the same institution exists,
this identification couldn’t be too much generic.
With all the data and requisites in hand, a hyperlink to an ISO image from
HOACD was given by the Distributed Honeypots Project’s coordination. This file is
personalized to each organization, differently from the one on the Internet [3], which
is a public version for tests. Later, the installation of HOACD was done. All the steps
described in the installation instructions were followed, including the suggested sizes
for the hard disk partitions.
As the installation was concluded, the Honeyd configuration file was changed in
order to have a more personalized and diversified environment. This configuration
will be presented in the next section.
After the honeypot configuration was finished, tests and remote checks (from
NBSO) could be done. The daily rotation of logs could be checked after some days –
HOACD is configured to rotate the system’s logs every day, generating new log files
and compressing the old ones, so as to facilitate the process of collecting and to save
space in the hard disk. Thereafter, the honeypot was subscribed at the central server
and the remote monitoring and periodic remote status check were started.
We observed that there was another filter at the university network, which wasn’t
letting packages destined to some ports to pass. Hence, the total deliverance from
external traffic was made available. Even with these changes, there was still a filter
located at the National Research Network (RNP) backbone, of which UnB is part.
While the RNP’s filter wasn’t released, it was decided to collect and analyse the
data available, even if it did not represent the whole universe of attack sources. From
the data we had, the majority of the source addresses were from UnB and just a little
bit from the rest of Brazil, what is explained by the existence of the RNP’s filter. For
that reason, it was decided that only logs from foreign activities would be used as the
database for analysis.
When the filters were all set, the daily data collecting service and summary
generation were set up within the Alliance, as well as the subscription of a responsible
person for this honeypot in the discussion list. From this moment, the institution was
86