Re: Best practices for securing SSH server

2009-06-28 Thread Chris Rees
2009/6/28 Polytropon free...@edvax.de: On Sat, 27 Jun 2009 21:17:11 -0400, Daniel Underwood djuatde...@gmail.com wrote: Exactly.  For example, the server in question is a desktop machine at work.  I regularly see transfer rates of 13MB/s.  It's at a major university, which is by itself

Re: Best practices for securing SSH server

2009-06-27 Thread Jos Chrispijn
Daniel Underwood wrote: laptop to connect to the server. Due to the speed and location of the connection, it's a relatively high-risk target. Can you tell me what you mean with that? I mean, imho a server must been consider always a risk target. Perhaps I don't understand. Jos Chrispijn

Re: Best practices for securing SSH server

2009-06-27 Thread Jon Radel
Jos Chrispijn wrote: Daniel Underwood wrote: laptop to connect to the server. Due to the speed and location of the connection, it's a relatively high-risk target. Can you tell me what you mean with that? I mean, imho a server must been consider always a risk target. Perhaps I don't

Re: Best practices for securing SSH server

2009-06-27 Thread Daniel Underwood
As I believe has already been answered in this thread, the better connected a server is to the Internet, the higher its value to several varieties of miscreants.  Given a choice between a server connected via a close to saturated T1 somewhere in the back waters of the Internet and a server

Re: Best practices for securing SSH server

2009-06-27 Thread Polytropon
On Sat, 27 Jun 2009 21:17:11 -0400, Daniel Underwood djuatde...@gmail.com wrote: Exactly. For example, the server in question is a desktop machine at work. I regularly see transfer rates of 13MB/s. It's at a major university, which is by itself another high-risk factor, precisely because

Re: Best practices for securing SSH server

2009-06-24 Thread RW
On Tue, 23 Jun 2009 22:37:12 +0200 Erik Norgaard norga...@locolomo.org wrote: You're right, as long as port-knocking as a first pass authentication scheme is not in wide spread use, then any attackers will not waste time port-knocking. If ever port-knocking becomes common, attackers will

Re: Best practices for securing SSH server

2009-06-24 Thread Erik Norgaard
RW wrote: On Tue, 23 Jun 2009 22:37:12 +0200 Erik Norgaard norga...@locolomo.org wrote: You're right, as long as port-knocking as a first pass authentication scheme is not in wide spread use, then any attackers will not waste time port-knocking. If ever port-knocking becomes common, attackers

Re: Best practices for securing SSH server

2009-06-24 Thread cpghost
On Wed, Jun 24, 2009 at 03:53:15PM +0200, Erik Norgaard wrote: RW wrote: On Tue, 23 Jun 2009 22:37:12 +0200 Erik Norgaard norga...@locolomo.org wrote: You're right, as long as port-knocking as a first pass authentication scheme is not in wide spread use, then any attackers will not

Re: Best practices for securing SSH server

2009-06-24 Thread Daniel Underwood
Point remains: Adding port knocking does not solve any security problem, it only adds complexity, cost, points of failure, inconvenience etc while making your problem appear differently and leaving you with the illusion of being more secure. I think that's grossly overstated, if not just

Re: Best practices for securing SSH server

2009-06-24 Thread Erik Norgaard
cpghost wrote: On Wed, Jun 24, 2009 at 03:53:15PM +0200, Erik Norgaard wrote: But port knocking can be useful and provide more security *if* you modify the kocking sequence algorithmically and make it, e.g. a function of time, source IP/range (and other factors). This could prevent a whole class

Re: Best practices for securing SSH server

2009-06-24 Thread cpghost
On Wed, Jun 24, 2009 at 04:50:01PM +0200, Erik Norgaard wrote: cpghost wrote: On Wed, Jun 24, 2009 at 03:53:15PM +0200, Erik Norgaard wrote: But port knocking can be useful and provide more security *if* you modify the kocking sequence algorithmically and make it, e.g. a function of time,

Re: Best practices for securing SSH server

2009-06-24 Thread RW
On Wed, 24 Jun 2009 17:12:59 +0200 cpghost cpgh...@cordula.ws wrote: It all boils down to this: do you login from a secure machine or not? Each tool has its own set of uses. When I want to log in from a public terminal, I prefer OPIE; OPIE is probably fine in almost all cases, but you may

Re: Best practices for securing SSH server

2009-06-23 Thread Jeff Laine
On Mon,06/22/09 [21:16:35], Daniel Underwood wrote: On a BSD box at work (at an extremely fast connection and static IP), I run an SSH server. I am the only person who uses the server, but I use it from some locations that are behind a dynamic IP (so I can't set pf rules to filter by IP). I

Re: Best practices for securing SSH server

2009-06-23 Thread Wojciech Puchar
connection, it's a relatively high-risk target. What are some good practices for securing this SSH server. Is using a stored key safer than a password in this instance? I have no If your password is not trivial, then it is secure. using RSA/DSA keys is as good, if you are sure nobody will get

Re: Best practices for securing SSH server

2009-06-23 Thread Wojciech Puchar
If for some reason you would prefer to use password authentication, I would recommend that you look into automatic brute force detection. There are a number of utilities in ports available for this purpose, including security/sshguard and security/denyhosts. good, but not really important with

Re: Best practices for securing SSH server

2009-06-23 Thread Matthew Seaman
Wojciech Puchar wrote: If for some reason you would prefer to use password authentication, I would recommend that you look into automatic brute force detection. There are a number of utilities in ports available for this purpose, including security/sshguard and security/denyhosts. good, but

Re: Best practices for securing SSH server

2009-06-23 Thread Wojciech Puchar
You can't do more than maybe 10 attempts/second this way, while cracking 10 character password consisting of just small letters and digits needs 10 characters is a longer than usual password. Most people have been conditioned into using a 7 or 8 character password, which is at least a so

Re: Best practices for securing SSH server

2009-06-23 Thread Chris Rees
2009/6/23 Wojciech Puchar woj...@wojtek.tensor.gdynia.pl: If for some reason you would prefer to use password authentication, I would recommend that you look into automatic brute force detection. There are a number of utilities in ports available for this purpose, including security/sshguard

Re: Best practices for securing SSH server

2009-06-23 Thread Wojciech Puchar
99% of crack attempts are done by kevin mitnick methods, not password cracking. You're right about the probability of password breaking, but personally I installed denyhosts just because I got sick of this: indeed, it's very useful but it's not a requirement at all to be secure :) The only

Re: Best practices for securing SSH server

2009-06-23 Thread Wojciech Puchar
99% of crack attempts are done by kevin mitnick methods, not password cracking. Absolutely true. Mitnick was an early exponent of Social Engineering attacks, which are still the easiest and most effective methods for Mitnick just chose the best possible friend - human stupidity. It never

Re: Best practices for securing SSH server

2009-06-23 Thread Daniel Underwood
why does the speed of a connection make it a higher risk? Super-fast connections are ideal targets for people to install private fileservers (among other things). ___ freebsd-questions@freebsd.org mailing list

Re: Best practices for securing SSH server

2009-06-23 Thread Daniel Underwood
I do not believe that tricks like running ssh on a non standard port or using port-knocking provide much extra security. I can understand that varying the port is not a very strong defensive measure, but I don't understand your point about port-knocking. If you configure a complex and

Re: Best practices for securing SSH server

2009-06-23 Thread Erik Norgaard
Daniel Underwood wrote: I do not believe that tricks like running ssh on a non standard port or using port-knocking provide much extra security. I can understand that varying the port is not a very strong defensive measure, but I don't understand your point about port-knocking. If you

Re: Best practices for securing SSH server

2009-06-23 Thread Bill Moran
In response to Erik Norgaard norga...@locolomo.org: Daniel Underwood wrote: I do not believe that tricks like running ssh on a non standard port or using port-knocking provide much extra security. I can understand that varying the port is not a very strong defensive measure, but I

Re: Best practices for securing SSH server

2009-06-23 Thread Erik Norgaard
Bill Moran wrote: In response to Erik Norgaard norga...@locolomo.org: You add an extra layer of inconvenience and complexity, more things that can fail and possibly result in an insecure server: I would agree with you, except ... - dynamically updating firewall rules on the interface

Re: Best practices for securing SSH server

2009-06-23 Thread Kurt Buff
On Mon, Jun 22, 2009 at 22:50, pradp...@towardsfreedom.com wrote: On Mon, 22 Jun 2009 21:16:35 -0400 Daniel Underwood djuatde...@gmail.com wrote: Due to the speed and location of the connection, it's a relatively high-risk target. why does the speed of a connection make it a higher risk?

Re: Best practices for securing SSH server

2009-06-23 Thread Daniel Underwood
A port-knocking sequence is really nothing different than a shared password. Technically and conceptually, that's true. But practically, I'm not sure you're right. If in addition to attempting to enumerate the space of possible passwords, an attacker also enumerates the space of possible

Re: Best practices for securing SSH server

2009-06-23 Thread Erik Norgaard
Daniel Underwood wrote: A port-knocking sequence is really nothing different than a shared password. Technically and conceptually, that's true. But practically, I'm not sure you're right. If in addition to attempting to enumerate the space of possible passwords, an attacker also enumerates

Re: Best practices for securing SSH server

2009-06-23 Thread Bill Moran
In response to Erik Norgaard norga...@locolomo.org: Bill Moran wrote: In response to Erik Norgaard norga...@locolomo.org: - dynamically updating firewall rules on the interface facing the Internet is not on my list of good practices. loading or flushing rules continuously is the

Re: Best practices for securing SSH server

2009-06-23 Thread Erik Norgaard
Bill Moran wrote: In response to Erik Norgaard norga...@locolomo.org: Bill Moran wrote: In response to Erik Norgaard norga...@locolomo.org: I do, you can put your interface in promiscuous mode and let the daemon grab packets before they are filtered by the firewall, or open in your

Best practices for securing SSH server

2009-06-22 Thread Daniel Underwood
On a BSD box at work (at an extremely fast connection and static IP), I run an SSH server. I am the only person who uses the server, but I use it from some locations that are behind a dynamic IP (so I can't set pf rules to filter by IP). I will always, however, use the same laptop to connect to

Re: Best practices for securing SSH server

2009-06-22 Thread Benjamin Lee
On 06/22/2009 06:16 PM, Daniel Underwood wrote: On a BSD box at work (at an extremely fast connection and static IP), I run an SSH server. I am the only person who uses the server, but I use it from some locations that are behind a dynamic IP (so I can't set pf rules to filter by IP). I will

Re: Best practices for securing SSH server

2009-06-22 Thread Moti
On Mon, Jun 22, 2009 at 9:43 PM, Benjamin Lee b...@b1c1l1.com wrote: On 06/22/2009 06:16 PM, Daniel Underwood wrote: On a BSD box at work (at an extremely fast connection and static IP), I run an SSH server. I am the only person who uses the server, but I use it from some locations that

Re: Best practices for securing SSH server

2009-06-22 Thread TJ Varghese
On Tue, Jun 23, 2009 at 9:43 AM, Benjamin Leeb...@b1c1l1.com wrote: On 06/22/2009 06:16 PM, Daniel Underwood wrote: On a BSD box at work (at an extremely fast connection and static IP), I run an SSH server.  I am the only person who uses the server, but I use it from some locations that are

Re: Best practices for securing SSH server

2009-06-22 Thread Earl E. Gay III
On Mon, Jun 22, 2009 at 9:16 PM, Daniel Underwood djuatde...@gmail.comwrote: On a BSD box at work (at an extremely fast connection and static IP), I run an SSH server. I am the only person who uses the server, but I use it from some locations that are behind a dynamic IP (so I can't set pf

Re: Best practices for securing SSH server

2009-06-22 Thread Tim Judd
On 6/22/09, Daniel Underwood djuatde...@gmail.com wrote: On a BSD box at work (at an extremely fast connection and static IP), I run an SSH server. I am the only person who uses the server, but I use it from some locations that are behind a dynamic IP (so I can't set pf rules to filter by

Re: Best practices for securing SSH server

2009-06-22 Thread prad
On Mon, 22 Jun 2009 21:16:35 -0400 Daniel Underwood djuatde...@gmail.com wrote: Due to the speed and location of the connection, it's a relatively high-risk target. why does the speed of a connection make it a higher risk? is it because bruteforce techniques can capitalize on the speed? --

Re: Best practices for securing SSH server

2009-06-22 Thread Erik Norgaard
Daniel Underwood wrote: On a BSD box at work (at an extremely fast connection and static IP), I run an SSH server. I am the only person who uses the server, but I use it from some locations that are behind a dynamic IP (so I can't set pf rules to filter by IP). I will always, however, use the