Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-15 Thread Thomas Seliger
Neal Murphy wrote: The point is to reduce brute-forace attacks to the point of nearly total ineffectiveness. I use OpenSSH public/private key authentication to achieve this. Based on needs one could also use two factor authentication (e.g. one time password tokens) or even a combination of

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-14 Thread Michael Stone
On Mon, Mar 13, 2006 at 11:06:38PM -0500, Neal Murphy wrote: The point is to obscure the ssh server from everyone, including those who are authorized to access it remotely. The point is to reduce brute-forace attacks to the point of nearly total ineffectiveness. No more so than simply configu

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-14 Thread Michel Messerschmidt
Neal Murphy said: > The point is to obscure the ssh server from everyone, including those who > are authorized to access it remotely. You're right, this is just the old idea of "security by obscurity". > The point is to reduce brute-forace attacks to the point of nearly total > ineffectiveness.

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Neal Murphy
On Monday 13 March 2006 20:07, Michael Stone wrote: > On Mon, Mar 13, 2006 at 03:03:24PM -0500, Neal Murphy wrote: > >The idea is to present information to the server that only the server can > >decrypt, and that, in theory, only the authorized user could have > > generated. > > Much like an authen

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Michael Stone
On Mon, Mar 13, 2006 at 03:03:24PM -0500, Neal Murphy wrote: The idea is to present information to the server that only the server can decrypt, and that, in theory, only the authorized user could have generated. Much like an authentication system. What's the point of all this over just authent

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Neal Murphy
On Monday 13 March 2006 09:38, [EMAIL PROTECTED] wrote: > On Mon, Mar 13, 2006 at 03:19:30AM -0500, Neal Murphy wrote: > > It seems kind-of counterproductive to set up SSH for secure access, then > > advertise to the universe that it's there. Thus my idea: > > > > Consider: > > - sshd listens on

Re: fail2ban [was: howto block ssh brute-force]

2006-03-13 Thread Ralph Katz
On 03/13/2006, johannes weiß wrote: > this is the std config. But it's widely configurable (e.g.: > --- SNIP (fail2ban.conf, std config) --- > fwban = iptables -I fail2ban-%(__name__)s 1 -s -j DROP > fwunban = iptables -D fail2ban-%(__name__)s -s -j DROP > maxfailures = 5 > bantime = 600 > findt

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread dsr
On Mon, Mar 13, 2006 at 03:19:30AM -0500, Neal Murphy wrote: > It seems kind-of counterproductive to set up SSH for secure access, then > advertise to the universe that it's there. Thus my idea: > > Consider: > - sshd listens on a pre-shared UDP port for 'a knock on the door', > specificall

Re: fail2ban [was: howto block ssh brute-force]

2006-03-13 Thread johannes weiß
Hi, also sprach johannes weiß <[EMAIL PROTECTED]> [2006.03.13.1132 +0100]: I use fail2ban and I'm very happy with it. Am I correct in assuming that it simply adds rules like -A fail2ban_chain -s 1.2.3.4/32 -j DROP this is the std config. But it's widely configurable (e.g.: ---

fail2ban [was: howto block ssh brute-force]

2006-03-13 Thread martin f krafft
also sprach johannes weiß <[EMAIL PROTECTED]> [2006.03.13.1132 +0100]: > I use fail2ban and I'm very happy with it. Am I correct in assuming that it simply adds rules like -A fail2ban_chain -s 1.2.3.4/32 -j DROP to iptables whenever 1.2.3.4/32 has too many login failures? Does it expire entri

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread johannes weiß
Hi Guys, > [...] I use fail2ban and I'm very happy with it. Just my 2 cents, regards, johannes -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Nicolas Rachinsky
* Neal Murphy <[EMAIL PROTECTED]> [2006-03-13 03:19 -0500]: > Consider: [...] Sounds like putting http://ingles.homeunix.org/software/ost/ into ssh(d). Nicolas -- http://www.rachinsky.de/nicolas -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Joerg Rieger
On Mon, Mar 13, 2006 at 03:19:30AM -0500, Neal Murphy wrote: [...] > My idea is akin to a monastery that has no visible way in or out. If someone > wants in, he has to know where to knock, using the Super Secret Squirrel > coded knock. Then he has to wait a bit before he tries to pass his > cr

Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Neal Murphy
On Monday 13 March 2006 01:24, fgeek wrote: > > Hello, > > > > once in a while (say, every two weeks) I get a brute-force > > login/password scan attempt in my server (i.e., a single ip tries > > dictionary account names and passwords at random). SSH access is > > needed by many users, and (RSA/DS

Re: howto block ssh brute-force

2006-03-12 Thread fgeek
> Hello, > > once in a while (say, every two weeks) I get a brute-force > login/password scan attempt in my server (i.e., a single ip tries > dictionary account names and passwords at random). SSH access is > needed by many users, and (RSA/DSA key)-only access is, at present > time, unwanted. So f

Re: howto block ssh brute-force

2006-03-12 Thread martin f krafft
also sprach Michael Loftis <[EMAIL PROTECTED]> [2006.03.12.2301 +0100]: > Yes you can make arbitrarily deep jumps/chains, but any single > list is still processed sequentially. Once could probably > implement scripting to produce a sort of binary tree on > hashes/jumps to chains. Fact is it does

Re: howto block ssh brute-force

2006-03-12 Thread Michael Loftis
--On March 12, 2006 2:29:09 PM +0100 martin f krafft <[EMAIL PROTECTED]> wrote: also sprach Michael Loftis <[EMAIL PROTECTED]> [2006.03.12.1159 +0100]: The only thing I can say is be *VERY* careful on a busy Linux box. iptables sucks. It's sequential, meaning every entry in a list has to be

Re: howto block ssh brute-force

2006-03-12 Thread alex black
Not that safe, some of those scanners to a portscan first looking for SSH. I use the old tried-and-true "know who you want accessing the machine" and add those people/ips to hosts.allow, and deny everything else. Works like a charm, and just keep a public backdoor machine you can use to hop into

Re: howto block ssh brute-force

2006-03-12 Thread Jaroslaw Tabor
Hello! Dnia 12-03-2006, nie o godzinie 04:50 -0300, Felipe Figueiredo napisał(a): > Hello, > > once in a while (say, every two weeks) I get a brute-force > login/password scan attempt in my server (i.e., a single ip tries I'm changing ssh port to some high random number. This is quite easy, safe

Re: howto block ssh brute-force

2006-03-12 Thread Daniel Givens
I wrote a script for just this thing a few months ago. The script I wrote, when executed from a cronjob, looks over the auth.log. When a dictionary attack is found, it puts the IP of the attacker in a peerguardian formatted file. From there, linblock (http://www.dessent.net/linblock/) is executed

Re: howto block ssh brute-force

2006-03-12 Thread martin f krafft
also sprach Michael Loftis <[EMAIL PROTECTED]> [2006.03.12.1159 +0100]: > The only thing I can say is be *VERY* careful on a busy Linux box. > iptables sucks. It's sequential, meaning every entry in a list has to be > processed. This is not the case. You can branch iptables rulesets to arbitrary

Re: howto block ssh brute-force

2006-03-12 Thread martin f krafft
also sprach Felipe Figueiredo <[EMAIL PROTECTED]> [2006.03.12.0850 +0100]: > Maybe there is a way to temporarily block ips upon such attempts (is > this a FAQ?), or maybe divert them like what portsentry does for > portscans? http://kindergarten.madduck.net/configs/iptables but there's a problem

Re: howto block ssh brute-force

2006-03-12 Thread martin f krafft
also sprach TiB <[EMAIL PROTECTED]> [2006.03.12.0927 +0100]: > I'm using to limit access from a each address to 3 connections per > minute. It's easy to set up and works fine using iptables ipt_recent > module. Be careful: http://lists.debian.org/debian-firewall/2006/03/msg00017.html -- Please

Re: howto block ssh brute-force

2006-03-12 Thread Christoph Moench-Tegeder
## Felipe Figueiredo ([EMAIL PROTECTED]): > once in a while (say, every two weeks) I get a brute-force > login/password scan attempt in my server (i.e., a single ip tries > dictionary account names and passwords at random). SSH access is > needed by many users, and (RSA/DSA key)-only access is, a

Re: howto block ssh brute-force

2006-03-12 Thread Michael Loftis
The only thing I can say is be *VERY* careful on a busy Linux box. iptables sucks. It's sequential, meaning every entry in a list has to be processed. Your best bet is to first match TCP SYN packets and jump to another separate chain ONLY for the SYN packets, then do your deny's there, and do

Re: howto block ssh brute-force

2006-03-12 Thread Johann Glaser
Hi! > Maybe there is a way to temporarily block ips upon such attempts (is > this a FAQ?), or maybe divert them like what portsentry does for > portscans? A friend recommended http://www.csc.liv.ac.uk/~greg/sshdfilter/ but I didn't try it myself. It runs as a daemon and blocks the IP if severa

Re: howto block ssh brute-force

2006-03-12 Thread Laurent Fousse
Hello, * Felipe Figueiredo [Sun, Mar 12, 2006 at 04:50:51AM -0300]: > once in a while (say, every two weeks) I get a brute-force > login/password scan attempt in my server (i.e., a single ip tries > dictionary account names and passwords at random). SSH access is > needed by many users, and (RSA/

Re: howto block ssh brute-force

2006-03-12 Thread Philipp A. Hartmann
Hi, On Sun, 2006-03-12 at 04:50 -0300, Felipe Figueiredo wrote: > Maybe there is a way to temporarily block ips upon such attempts (is > this a FAQ?), or maybe divert them like what portsentry does for > portscans? You might want to have a look at the package denyhosts [1], which seems to be ab

Re: howto block ssh brute-force

2006-03-12 Thread TiB
Felipe Figueiredo wrote: Hello, once in a while (say, every two weeks) I get a brute-force login/password scan attempt in my server (i.e., a single ip tries dictionary account names and passwords at random). SSH access is needed by many users, and (RSA/DSA key)-only access is, at present time,

howto block ssh brute-force

2006-03-11 Thread Felipe Figueiredo
Hello, once in a while (say, every two weeks) I get a brute-force login/password scan attempt in my server (i.e., a single ip tries dictionary account names and passwords at random). SSH access is needed by many users, and (RSA/DSA key)-only access is, at present time, unwanted. So far none such