On 2024-12-16, Poon Weng Chee <poo...@avmcloud.net> wrote: > > Dear Debian, > > We have discovered that the public IP address of deb.debian.org, which is u= > sed to access the Debian repositories, is listed as a threat or malicious I= > P address on http://brightcloud.com/support/lookup.php. > Despite attempting to submit this IP address for removal from the threat li= > st, it has been repeatedly reclassified as a threat or malicious IP address= > within a one to two day timeframe. > We suspect that your public IP address may be under attack or being misused= > by others. We would appreciate it if you could investigate this matter fur= > ther.
Confirm the IP: Check the current IP address associated with deb.debian.org by resolving it with DNS: dig +short deb.debian.org Check BrightCloud: Use the BrightCloud IP lookup tool to verify its status. Cross-Check with Other Tools: Check on alternative threat intelligence databases (e.g., VirusTotal, AbuseIPDB) to see if other platforms are also flagging it. Contact Debian Reach out to the Debian infrastructure team to inform them of the issue: Email: debian-mirr...@lists.debian.org Provide details such as: The affected IP address. The results from BrightCloud's lookup tool. Any relevant error messages or logs indicating the issue. The Debian team might already be aware of the issue and working on mitigation steps, especially if it's due to abuse reports or misclassification. Report to BrightCloud Submit a reclassification request to BrightCloud: Visit the BrightCloud support page. Provide: The IP address. An explanation (e.g., "This is a legitimate server hosting Debian Linux repositories used globally for software updates."). Supporting links or documentation, such as the official Debian mirror page. BrightCloud's team should reassess the classification, but ensure you provide strong context to avoid repeated reclassification. Mitigation Suggestions If the IP is reclassified repeatedly: Cause Investigation: The IP may be shared with other services exhibiting suspicious behavior. Past abuse reports (e.g., hosting malware or botnet activity) may have caused its poor reputation. Debian might need to review its hosting provider or consider rotating to an unflagged IP. BrightCloud may need to be involved directly to clarify the source of repeated flagging. Temporary Workaround: Use alternative mirrors while resolving the issue. Debian provides a list of official mirrors. Long-Term Prevention Suggest that Debian and its hosting provider regularly monitor the reputation of their IPs across threat intelligence platforms to proactively address such issues. This approach ensures that the issue is addressed both with BrightCloud and at the source, while providing users with temporary alternatives.