(apologize, in advance for the length of this)
Informing me that the google cloud platform/API I had established (two, one CentOS 7.1 and the other a Ubuntu LTS version) had been reported as being involved in scanning etc. of another network. The warning message says I should take care of it within 3 days or the project (they provided the project ID) will be disabled. They didn't mention which instance ... no IP no OS no nothing.
The CentOS instance and I had gone through and installed the lastest updates/fixes etc. for that OS and then setup ssh keys (as it was recommended as an alternative to what I'm guessing is the browser based method). Only one user. Had also setup a AMP stack with Moodle via git ... so latest most secure code there. The Ubuntu instance, I later learned, was the instance (IP address shown in a full report is that servers activities) that had been hacked.
I've installed quite a few standalone servers with CentOS and Ubuntu LTS versions and know one can get the minimums done for security purposes then come back to finish the job at a later date.
Observations on the CentOS ... within 2 minutes of that server online, already pokes and probes on port 22 ... yes, to be expected. Installed denyhost and logwatch and much to my surprise the majority of those pokes and probes where apparently coming from a competitior ... Amazon! AND one or two from the same IP class C block the server had been assigned to. It was a little more than 'Noisy Neighbors' - more like "nosy".
Since I wasn't informed as to which instance (IP address) until later, I decided to wipe them both clean ... ie, remove the entire instances and begin again. Afterwards, I do get a reponse which indicated it was only the Ubuntu instance. Grrrrrr!
Since then, have begun again ... under the same project ID yet another CentOS 7.1 instance and made sure I locked it down ... even left SeLinux running and went the trouble of configuring that for a Moodle installation via git. No Ubuntu this time. And this time, didn't setup ssh keys, etc.. ... use the provided 'button' to access server via ssh.
Yet, I rec. the same warning message about hourly ... today is the final day so am waiting to see if I've just waisted at least two days time with this project or not.
Has anyone had a like experience?
I, for one, will not recommend to others they do anything mission critical on the platform IF this is how such things are handled.
A few thoughts have come to me ... :
1. there should be a mandatory first run that acquires the latest updates for the OS.
2. we all know that the instances OS's don't launch all services and that OP is responsible for installs and config, but would think that the default firewall rules for ssh should be limited to the server itself first instead of
0.0.0.0/ALL3. information about the other 10. IP addresses I see in the networking setup ... I assume those controled by Google itself and cannot be used as a 'back door' by other customers.
4. is these are based on usage, does the customer pay for the pokes and probes, etc. usage in defending vs those that would do harm to your systems? Don't know how that would be 'metered' but could see Amazon or other such providers getting 'involved' on the sly to show folks that their servers/services are much better than Googles. NOT saying they would do that 'officially' ... could be a devote/Amazon fan boy, etc. doing Amazon a 'favor' ... who knows! (see, I trust no one these days! ;\)
Sorry of the rant ... hopefully someone (a human) will take the time to tell me where I went wrong and or how to prevent such events in the future (other than RTFM .. . I HAVE and know it quite well).
'spirit of sharing', Ken