Re: brutal SSH attacks

2011-02-08 Thread jhell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, 8 Feb 2011 20:38, vchepkov@ wrote: On Feb 8, 2011, at 8:36 PM, Helmut Schneider wrote: Here are entries with pass in log enabled: 19:59:08.149358 rule 5/0(match): pass in on bce1: 93.174.31.134.36872 > 38.X.X.X.22: Flags [S], seq 4417

Re: brutal SSH attacks

2011-02-08 Thread Vadym Chepkov
On Feb 8, 2011, at 8:36 PM, Helmut Schneider wrote: >> Here are entries with pass in log enabled: >> >> 19:59:08.149358 rule 5/0(match): pass in on bce1: 93.174.31.134.36872 > >> 38.X.X.X.22: Flags [S], seq 441726758, win 5840, options [mss 1460,sackOK,TS >> val 395810874 ecr 0,nop,wscale 7],

Re: brutal SSH attacks

2011-02-08 Thread Helmut Schneider
Here are entries with pass in log enabled: 19:59:08.149358 rule 5/0(match): pass in on bce1: 93.174.31.134.36872 > 38.X.X.X.22: Flags [S], seq 441726758, win 5840, options [mss 1460,sackOK,TS val 395810874 ecr 0,nop,wscale 7], length 0 And 38.x.x.x is the external ip of your gateway?! (my las

Re: brutal SSH attacks

2011-02-08 Thread Vadym Chepkov
I should have mentioned it. Some IPs do get into abusive_hosts table, but some do not and I don't understand, why, how do they avoid of getting caught. Vadym On Feb 8, 2011, at 8:07 PM, Vadym Chepkov wrote: > > On Feb 8, 2011, at 7:11 PM, Vadym Chepkov wrote: > >> >> On Feb 8, 2011, at 7:0

Re: brutal SSH attacks

2011-02-08 Thread Luke Jee
Hi Vadyam, try this: table remove persist, i remember it means table will readonly On Wed, Feb 9, 2011 at 2:11 AM, Vadym Chepkov wrote: > Hi, > > Could somebody help in figuring out why PF configuration meant to prevent > brutal SSH attacks doesn't work. > > Here are the relevant parts: > > /

Re: brutal SSH attacks

2011-02-08 Thread Vadym Chepkov
On Feb 8, 2011, at 7:11 PM, Vadym Chepkov wrote: > > On Feb 8, 2011, at 7:01 PM, Helmut Schneider wrote: > Check your pflog. The ruleset itself seems fine (if it is complete and you did not forget to post a vital part). We also can assume that pf is enabled, can we? >>> >>> Wha

Re: brutal SSH attacks

2011-02-08 Thread Vadym Chepkov
On Feb 8, 2011, at 7:47 PM, Luke Jee wrote: > Hi Vadyam, > > try this: > table > > remove persist, i remember it means table will readonly That contradicts the manual: Tables may be defined with the following two attributes: persist The persist flag forces the kernel to keep the

Re: brutal SSH attacks

2011-02-08 Thread Vadym Chepkov
On Feb 8, 2011, at 7:01 PM, Helmut Schneider wrote: >>> Check your pflog. The ruleset itself seems fine (if it is complete and you >>> did not forget to post >>> a vital part). We also can assume that pf is enabled, can we? >> >> What should I be looking for in pflog? I can't find anything ssh

Re: brutal SSH attacks

2011-02-08 Thread Helmut Schneider
Check your pflog. The ruleset itself seems fine (if it is complete and you did not forget to post a vital part). We also can assume that pf is enabled, can we? What should I be looking for in pflog? I can't find anything ssh related. I posted full ruleset too. [...] [root@castor /var/log]# fo

Re: brutal SSH attacks

2011-02-08 Thread Vadym Chepkov
On Feb 8, 2011, at 5:26 PM, Helmut Schneider wrote: >> Could somebody help in figuring out why PF configuration meant to prevent >> brutal SSH attacks doesn't work. > > Check your pflog. The ruleset itself seems fine (if it is complete and you > did not forget to post a vital part). We also ca

Re: brutal SSH attacks

2011-02-08 Thread Helmut Schneider
Could somebody help in figuring out why PF configuration meant to prevent brutal SSH attacks doesn't work. Check your pflog. The ruleset itself seems fine (if it is complete and you did not forget to post a vital part). We also can assume that pf is enabled, can we?

Re: brutal SSH attacks

2011-02-08 Thread Vadym Chepkov
On Feb 8, 2011, at 2:58 PM, Mike Tancsa wrote: > On 2/8/2011 1:11 PM, Vadym Chepkov wrote: >> Hi, >> >> Could somebody help in figuring out why PF configuration meant to prevent >> brutal SSH attacks doesn't work. >> >> Here are the relevant parts: >> >> /etc/ssh/sshd_config >> >> PasswordAu

Re: brutal SSH attacks

2011-02-08 Thread Mike Tancsa
On 2/8/2011 1:11 PM, Vadym Chepkov wrote: > Hi, > > Could somebody help in figuring out why PF configuration meant to prevent > brutal SSH attacks doesn't work. > > Here are the relevant parts: > > /etc/ssh/sshd_config > > PasswordAuthentication no > MaxAuthTries 1 > > /etc/pf.conf > > block

brutal SSH attacks

2011-02-08 Thread Vadym Chepkov
Hi, Could somebody help in figuring out why PF configuration meant to prevent brutal SSH attacks doesn't work. Here are the relevant parts: /etc/ssh/sshd_config PasswordAuthentication no MaxAuthTries 1 /etc/pf.conf block in log on $wan_if table persist block drop in quick from pass quick