[ale] SSH attempts

Dennis Ruzeski denniruz at gmail.com
Mon Sep 19 15:00:24 EDT 2011


I haven't been reading this thread so forgive me if someone mentioned this,
but I used to use a port knock daemon. It's not bullet proof in and of
itself but I think could be valuable as part of a greater scheme.


--Dennis



On Mon, Sep 19, 2011 at 2:47 PM, David Hillman <hillmands at gmail.com> wrote:

> I agree running SSH on a different port isn't very good security.  Every
> access that comes in from the Internet is done via public key on our
> end.  Passwords aren't even allowed on the LAN.  Then again, if someone
> is on the LAN, security from the Internet is the least of the concerns.
> I think there was someone working on using a machine ID system to
> identify and track machines on the local network that don't belong there.
>
> On 9/12/11 5:40 PM, Bob Toxen wrote:
> > Usually the hackers will try up to 1000 passwords on common accounts.  I
> > know someone who had a root password of "password" and one who had
> > "root1234" (without quotes) on Internet-connected *nix systems.  I got
> > one to change in time; the other got hacked.
> >
> > Unless you monitor for unsuccessful attacks you don't know how hard they
> > are trying and how close they are getting.
> >
> > It's my experience that even many of the best System Administrators do
> > not know what makes a hard-to-break password without education.  I had
> > the pleasure to provide that to ALE last month and it's in the book.
> > Aaron should have that talk's video available some time this month for
> > free viewing by ALE members.
> >
> >
> > I highly recommend PortSentry for locking out port scanners.
> >
> > Moving ssh to a different port will NOT stop a hacker who knows what she
> > is doing.  Allowing log in only via a ssh public key or only from a
> > short list of IPs with a very strong password will stop anyone (unless
> > that private key or allowed IP's system is hacked).
> >
> > Disabling root ssh and requiring one first to ssh in through another
> > account and su'ing or sudo'ing to root is not as effective as the above
> > solutions and may diminish security, in my opinion.
> >
> > Bob Toxen
> > bob at verysecurelinux.com               [Please use for email to me]
> > http://www.verysecurelinux.com        [Network&Linux security
> consulting]
> > http://www.realworldlinuxsecurity.com [My book:"Real World Linux
> Security 2/e"]
> > Quality Linux&  UNIX security and SysAdmin&  software consulting since
> 1990.
> > Quality spam and virus filters.
> >
> > "One disk to rule them all, One disk to find them. One disk to bring
> > them all and in the darkness grind them. In the Land of Redmond where
> > the shadows lie...and the Eye is everwatching"
> > -- The Silicon Valley Tarot Henrique Holschuh with ... Bob
> >
> > On Mon, Sep 12, 2011 at 03:07:26PM -0400, Rich Faulkner wrote:
> >> My experience with these was that attackers were looking for an easy
> >> entry.  I mean EASY.  And some of the companies I was working on were
> >> more than easy prey...and I'm not even sure they're still in business as
> >> I told them over and over again to not follow these practices.  But they
> >> did anyway....and for all I know they're gonners now.
> >> One in particular (a former employer) has never changed their passwords.
> >> None that I am aware of...and that's with the coming and going of many
> >> an employee from engineering.  This includes FTP sites for content, VPNs
> >> and the main database servers.  This not a major issue and a glaring
> >> hole in security?  But then again, I don't work there anymore and will
> >> not attempt to gain access to their systems just to see if they have
> >> changed the passwords.
> >> I DID just buy BOB TOXIN's book and got it in the mail over the weekend.
> >> Yeah, you Bob!  Will be looking for you at an ALE Meeting soon to sign
> >> it for me!  (Also need the CD - BTW...it was a used book and had the
> >> disk missing).  But more to the original point...I would rather HACK MY
> >> OWN NETWORK than hack someone else's and that's exactly what I'm about
> >> to start doing.  Thanks to the inspiration of the last ALE Meeting and
> >> topics like this thread....
> >> Bowing to Linux greatness in my midst....
> >
> >> On Mon, 2011-09-12 at 13:38 -0400, Michael H. Warfield wrote:
> >>> On Mon, 2011-09-12 at 13:19 -0400, Erik Mathis wrote:
> >>>> I have to disagree with you on this, as you are only concerned about
> >>>> ssh. Since the remote box is most likely owned, ssh brute force
> >>>> attacks is likely only going to be the first wave of hate coming from
> >>>> that IP. Its best to me to just take a scorched earth approached in
> >>>> these situations. Every three months or so, you can remove the ACL
> >>>> (how ever you end up blocking) and see if it the hate comes back. Auto
> >>>> add rules should take care of the rest. In other words, its best to be
> >>>> prudent and proactive now, then later when your stuff is hacked and
> >>>> your only left with reactive options.
> >>> Ok...  You guys apparently don't know what Abacus Port Sentry does.
> >>> That's what it does.  If it detects a port scan above a certain
> >>> threshold, it blocks it out.  I knew the author.  I haven't played with
> >>> it in years but it is very effective and is the archetype for some
> >>> similar modern projects.  Unless he's talking about another "Port
> >>> Sentry", he's already doing what he can and denyhost and fail2ban have
> >>> nothing to over over port sentry.
> >>>
> >>> Also, as the runner of a honeynet for well over a decade, I can tell
> you
> >>> this - your argument just does not hold water.  I have never seen a
> >>> follow up attack from correlated IP addresses on other services
> >>> following unsuccessful ssh attempts.  If they can't connect to ssh, I
> >>> never hear from them on anything else.  I have capture data going back
> >>> to 1998 on my darknet.  No correlation.  Even if they connect to one of
> >>> my honeypots (another band of addresses) they still never come back and
> >>> attack on another service.  It's not happening.  It's a nice argument
> >>> but you're just scaring away ghosts in New York City (old OLD joke).
> >>> The ssh scanning that's taking place is a joke.  I seriously thought
> >>> they would have at least TRIED the stupid Debian bad ssh keys and my
> >>> honeypots were set up to deliberately trap and log on that if any ever
> >>> showed up.  Nada!  All I get are stoopid attempts at passwords like:
> >>>
> >>> password
> >>> passwd
> >>> toor
> >>> qwert
> >>> trewq
> >>> poiuy
> >>> yuiop
> >>> 12345
> >>> 09876
> >>>
> >>> Seriously!
> >>>
> >>> And they've never come back a knocking.  Even on very legitimate
> looking
> >>> honeypot systems with open services and everything.
> >>>
> >>>> -Erik-
> >>> Regards,
> >>> Mike
> >>>
> >>>> On Mon, Sep 12, 2011 at 12:36 PM, Michael H. Warfield<
> mhw at wittsend.com>  wrote:
> >>>>> On Mon, 2011-09-12 at 11:59 -0400, Erik Mathis wrote:
> >>>>>> Use denyhosts. Simple and really easy to use.
> >>>>>> On Mon, Sep 12, 2011 at 11:05 AM, David Hillman<hillmands at gmail.com>
>  wrote:
> >>>>>>> According to the PortSentry logs for my server, I have received
> thousands of
> >>>>>>> connection attempts via SSH port 22.  Of course, that is not the
> port the
> >>>>>>> real SSH service is listening on. Logins were also disabled for
> root.
> >>>>>>> What's interesting is the IP addresses all belong to Serverloft
> >>>>>>> (www.serverloft.eu); most attempts came from 188.138.32.16
> >>>>>>> (loft4385.serverloft.eu).  I am guessing someone with a few VPS
> boxes has
> >>>>>>> nothing better to do than use up network bandwidth to terrorize the
> rest of
> >>>>>>> us.  Or, maybe those boxes have been compromised.
> >>>>>>> I have e-mailed the folks over over at Serverloft, but I don't
> expect
> >>>>>>> anything of it.  Is there anything else I can do?
> >>>>> Hold the phone here!
> >>>>>
> >>>>> You guys are trying to over engineer this.  Read what the OP wrote.
> >>>>>
> >>>>> He's got ssh running on a different port already.  fail2ban and
> >>>>> denyhosts will do nothing that port sentry (and I'm assuming that's
> the
> >>>>> old Abacus Port Sentry) and simple firewall rules won't do.  All he's
> >>>>> seeing is connection ATTEMPTS.  There's nothing there to connect to
> so
> >>>>> all he's seeing is Port Sentry logging noise.  You've got it blocked
> >>>>> already and the service isn't running there anyways.  You don't want
> the
> >>>>> noise, stop logging it.  That's all.  You can't stop the attempts.
>  But
> >>>>> the attempts don't result in any connections.  Nothing more to do.
>  Move
> >>>>> on.
> >>>>>
> >>>>> Mike
> >>>>> --
> >>>>> Michael H. Warfield (AI4NB) | (770) 985-6132 |  mhw at WittsEnd.com
> >>>>>    /\/\|=mhw=|\/\/          | (678) 463-0932 |
> http://www.wittsend.com/mhw/
> >>>>>    NIC whois: MHW9          | An optimist believes we live in the
> best of all
> >>>>>   PGP Key: 0x674627FF        | possible worlds.  A pessimist is sure
> of it!
> > _______________________________________________
> > Ale mailing list
> > Ale at ale.org
> > http://mail.ale.org/mailman/listinfo/ale
> > See JOBS, ANNOUNCE and SCHOOLS lists at
> > http://mail.ale.org/mailman/listinfo
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.ale.org/pipermail/ale/attachments/20110919/90770695/attachment-0001.html 


More information about the Ale mailing list