Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-05 Thread Gaurav Ghimire
On Apr 5, 2011, at 11:46 PM, Ljubomir Ljubojevic wrote: > rrich...@blythe.org wrote: >> Indeed! I run >> Fail2Ban not only against SSH, but against SMTP/AUTH and IMAPS/POP3S (the >> only client mail protocols we support). It's amazing how many dictionary >> attacks take place against SMTP by persi

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-05 Thread Ljubomir Ljubojevic
rrich...@blythe.org wrote: > Indeed! I run > Fail2Ban not only against SSH, but against SMTP/AUTH and IMAPS/POP3S (the > only client mail protocols we support). It's amazing how many dictionary > attacks take place against SMTP by persistent spamers! Besides the effect > against dictionary attacks,

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-05 Thread Rudi Ahlers
On Tue, Apr 5, 2011 at 5:51 PM, wrote: > > > >> Introducing a Hawk helped us a lot. Tools like Hawk and > fail2ban are quite >> useful, actually only thinks like that have > good impact on the bruteforce >> attempts. > > Indeed! I run > Fail2Ban not only against SSH, but against SMTP/AUTH and IMA

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-05 Thread rrichard
> Introducing a Hawk helped us a lot. Tools like Hawk and fail2ban are quite > useful, actually only thinks like that have good impact on the bruteforce > attempts. Indeed! I run Fail2Ban not only against SSH, but against SMTP/AUTH and IMAPS/POP3S (the only client mail protocols we support). It

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-05 Thread Marian Marinov
On Tuesday 05 April 2011 11:27:49 Rudi Ahlers wrote: > On Tue, Apr 5, 2011 at 10:17 AM, John Hodrien wrote: > > On Tue, 5 Apr 2011, rrich...@blythe.org wrote: > >> 1) Move sshd to another > >> port, one higher than 5000 > > > > I'd have mixed feelings about the Wisdom of running on a non-reserve

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-05 Thread John Hodrien
On Tue, 5 Apr 2011, Rudi Ahlers wrote: > Why, > > We've been running SSH on hundreds of servers on a port higher than > 5000 for year now and no problems at all. I always feel slightly ickie about running services on ports normal users can run on (this obviously depends a lot on who can run proce

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-05 Thread Rudi Ahlers
On Tue, Apr 5, 2011 at 10:17 AM, John Hodrien wrote: > On Tue, 5 Apr 2011, rrich...@blythe.org wrote: > >> 1) Move sshd to another >> port, one higher than 5000 > > I'd have mixed feelings about the Wisdom of running on a non-reserved port. > Why, We've been running SSH on hundreds of servers o

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-05 Thread John Hodrien
On Tue, 5 Apr 2011, rrich...@blythe.org wrote: > 1) Move sshd to another > port, one higher than 5000 I'd have mixed feelings about the Wisdom of running on a non-reserved port. jh ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailm

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread rrichard
> Hi, > > to prevent scripted dictionary attacks to sshd > I applied those iptables rules: > > -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent > --update --seconds 60 --hitcount 4 --name SSH --rsource -j DROP > -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent --

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread Devin Reade
--On Monday, April 04, 2011 09:15:28 PM +0200 Ljubomir Ljubojevic wrote: > I use Denyhosts for my security. All attacking IP's are blocked > automatically and sent to Denyhosts database server. Those IP's, from > around the world are then shared amongst all denyhosts users/systems, so >I a

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread Ljubomir Ljubojevic
David G. Miller wrote: > Rainer Traut writes: > >> Hi, >> >> to prevent scripted dictionary attacks to sshd >> I applied those iptables rules: > SNIP > > Lots of good advice from several people. All of the suggested solutions mean > you still have to wade through log entries from the unsuccess

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread Marian Marinov
On Monday 04 April 2011 21:08:45 David G.Miller wrote: > Rainer Traut writes: > > Hi, > > > > to prevent scripted dictionary attacks to sshd > > > I applied those iptables rules: > SNIP > > > Lots of good advice from several people. All of the suggested solutions > mean you still have to wade

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread m . roth
David G. Miller wrote: > Rainer Traut writes: > >> >> to prevent scripted dictionary attacks to sshd >> I applied those iptables rules: > SNIP > > Lots of good advice from several people. All of the suggested solutions > mean you still have to wade through log entries from the unsuccessful attack

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread David G . Miller
Rainer Traut writes: > > Hi, > > to prevent scripted dictionary attacks to sshd > I applied those iptables rules: SNIP > Lots of good advice from several people. All of the suggested solutions mean you still have to wade through log entries from the unsuccessful attacks. I've been quite h

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread m . roth
Rainer Traut wrote: > Am 04.04.2011 12:34, schrieb Marian Marinov: >>> How is it possible for an attacker to try to logon more then 4 times? >>> Can the attacker do this with only one TCP/IP connection without >>> establishing a new one? >>> Or have the scripts been adapted to this? >> >> The attac

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread aly . khimji
...@centos.org Date: Mon, 4 Apr 2011 18:00:23 To: CentOS mailing list Reply-To: CentOS mailing list Subject: Re: [CentOS] sshd: Authentication Failures: 137 Time(s) ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread Marian Marinov
Guys, really... look at denyhosts and Hawk. Both projects analyze the logs of the service and check for failed login attempts. It is useless to battle the bruteforcers at the network level since they can adapt their behaviour to really easy surcomvent any firewalls. In order to protect your a

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread John Hodrien
On Mon, 4 Apr 2011, Tom Yates wrote: > i occasionally trip my iptables rule myself, for example if i scp a couple > of files off a server and then go back for a third; i feel it would be a > shame to lock myself out for an hour, by doing that. An argument for something like pam_tally? Ideally, y

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread Tom Yates
On 04/04/11 11:18, Rainer Traut wrote: > to prevent scripted dictionary attacks to sshd > I applied those iptables rules: > > -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent > --update --seconds 60 --hitcount 4 --name SSH --rsource -j DROP > -A INPUT -p tcp -m state --state NEW

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread henry ritzlmayr
Am Montag, den 04.04.2011, 16:04 +0200 schrieb David Sommerseth: > On 04/04/11 15:35, henry ritzlmayr wrote: > > Am Montag, den 04.04.2011, 15:07 +0200 schrieb Rainer Traut: > >> Am 04.04.2011 12:34, schrieb Marian Marinov: > How is it possible for an attacker to try to logon more then 4 times

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread Jason Brown
You could also try using tcpwrappers along with iptables. On 04/04/2011 06:34 AM, Marian Marinov wrote: > On Monday 04 April 2011 12:18:43 Rainer Traut wrote: >> Hi, >> >> to prevent scripted dictionary attacks to sshd >> I applied those iptables rules: >> >> -A INPUT -p tcp -m state --state NEW

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread David Sommerseth
On 04/04/11 15:35, henry ritzlmayr wrote: > Am Montag, den 04.04.2011, 15:07 +0200 schrieb Rainer Traut: >> Am 04.04.2011 12:34, schrieb Marian Marinov: How is it possible for an attacker to try to logon more then 4 times? Can the attacker do this with only one TCP/IP connection without >

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread henry ritzlmayr
Am Montag, den 04.04.2011, 15:07 +0200 schrieb Rainer Traut: > Am 04.04.2011 12:34, schrieb Marian Marinov: > >> How is it possible for an attacker to try to logon more then 4 times? > >> Can the attacker do this with only one TCP/IP connection without > >> establishing a new one? > >> Or have the

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread Rainer Traut
Am 04.04.2011 12:34, schrieb Marian Marinov: >> How is it possible for an attacker to try to logon more then 4 times? >> Can the attacker do this with only one TCP/IP connection without >> establishing a new one? >> Or have the scripts been adapted to this? > > The attackers are not trying constant

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread Marian Marinov
On Monday 04 April 2011 12:18:43 Rainer Traut wrote: > Hi, > > to prevent scripted dictionary attacks to sshd > I applied those iptables rules: > > -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent > --update --seconds 60 --hitcount 4 --name SSH --rsource -j DROP > -A INPUT -p tcp

Re: [CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread David Sommerseth
On 04/04/11 11:18, Rainer Traut wrote: > Hi, > > to prevent scripted dictionary attacks to sshd > I applied those iptables rules: > > -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent > --update --seconds 60 --hitcount 4 --name SSH --rsource -j DROP > -A INPUT -p tcp -m state --st

[CentOS] sshd: Authentication Failures: 137 Time(s)

2011-04-04 Thread Rainer Traut
Hi, to prevent scripted dictionary attacks to sshd I applied those iptables rules: -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent --update --seconds 60 --hitcount 4 --name SSH --rsource -j DROP -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent --set --name SSH -