On 7 December 2011 12:46, Lamar Owen <lo...@pari.edu> wrote:
> On Wednesday, December 07, 2011 05:32:00 AM Ljubomir Ljubojevic wrote:
>> There is also use of denyhosts and fail2ban. They allow only few
>> attempts from one IP, and all users can share attacking IP's (default is
>> every 30 min) so you are automatically protected from known attacking
>> IP's. Any downside on this protection?
>
> Botnets.  If a 100,000 host botnet hits you with a coordinated brute-force 
> attack, fail2ban and other similar tools won't help you, as every attempt 
> will come from a different host.  This may be one way the brute-forcers 
> appear to get in on the first or second try.  And some brute-forcers are the 
> so-called 'slow' brute-forcers that try things very slowly and never trigger 
> some of these protections.
>
> And don't let your guard down just because you have disabled password login 
> and have key-based auth; if a remote exec breach is found in a different 
> daemon that can write (or can execute a local root exploit that can then 
> write) to /etc/ssh/sshd_config, it's game over.  This is where SELinux in 
> enforcing mode with properly configured contexts and no unconfined users can 
> save the day.  Attach access rights to sshd_config to a local console user or 
> similar  (that's one thing ConsoleKit and PolicyKit are for) and make certain 
> other files are not writeable remotely as well.

For passwords get g0tm1lk's list to check out what you use.

http://g0tmi1k.blogspot.com/2011/06/dictionaries-wordlists.html

SELinux is great but didn't save Russell Coker from having his play
machine owned with the vmsplice exploit.

http://etbe.coker.com.au/2008/04/03/trust-and-play-machine/
http://www.coker.com.au/selinux/play.html

RSA also showed that social engineering is still an excellent vector.

http://www.f-secure.com/weblog/archives/00002226.html

-the offending exploit had to be retrieved from the spam folder prior
to being opened
spear phishing ftw

Ultimately you could be running OpenBSD in a datacentre with all
manners of precautions  yet if the attacker can blag his/her way in
then your data is still all gone.
It'll cost them a *lot* more money than running autopwn against /8s
but the pay off will be higher.

Rigorous patching, non-default ports, key based authentication,
fail2ban/denyhosts, port knocking, SELinux &c are useful in increasing
the cost of breaking into boxen above the (drive-by/skiddie)
breakpoint of almost free but from that point onwards you need to
balance potential cost of break-in against cost of prevention.

mike
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to