Re: sshd break-in attempt

2007-01-09 Thread Enrique Ayesta Perojo
El Martes, 2 de Enero de 2007 14:12, Nathan Vidican escribió:
> In our 'periodic daily' report/email, (only the list goes on for hundreds
> of attempts). Anyhow, long story short; is there not an easy way to make
> sshd block or deny hosts temporarily if X number of invalid login attempts
> are made within a minute's time? Must I use an external wrapper to
> accomplish this, or can it be done with options to sshd on it's own?

I'm using security/bruteforceblocker with success, it's easy to install and 
run and works with pf
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: sshd break-in attempt

2007-01-05 Thread Peter N. M. Hansteen
Nathan Vidican <[EMAIL PROTECTED]> writes:

>  of attempts). Anyhow, long story short; is there not an easy way to
> make sshd block or deny hosts temporarily if X number of invalid
> login attempts are made within a minute's time? 

if you use pf, it's fairly straightforward with an overload rule, see eg
http://home.nuug.no/~peter/pf/en/bruteforce.html

Cheers,
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
Dec 22 02:13:59 delilah spamd[29949]: 85.152.224.147: disconnected after 42673 
seconds.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: sshd break-in attempt

2007-01-03 Thread Michael

Per olof Ljungmark wrote:

Nathan Vidican wrote:
We keep getting attempts from what look like a username/password 
scanner utility to login to our servers externally via sshd. 
Thankfully, we're not ignorant enough to leave common account names 
open, however it is annoying to say the least. We're getting things 
like this:


Jan  1 09:07:34 fw sshd[66547]: Invalid user staff from 208.44.210.15
Jan  1 09:07:35 fw sshd[66549]: Invalid user sales from 208.44.210.15
Jan  1 09:07:36 fw sshd[66551]: Invalid user recruit from 208.44.210.15
Jan  1 09:07:37 fw sshd[66553]: Invalid user alias from 208.44.210.15
Jan  1 09:07:38 fw sshd[66555]: Invalid user office from 208.44.210.15
Jan  1 09:07:38 fw sshd[66557]: Invalid user samba from 208.44.210.15
Jan  1 09:07:39 fw sshd[66559]: Invalid user tomcat from 208.44.210.15
Jan  1 09:07:40 fw sshd[66561]: Invalid user webadmin from 208.44.210.15
Jan  1 09:07:41 fw sshd[66563]: Invalid user spam from 208.44.210.15
Jan  1 09:07:42 fw sshd[66565]: Invalid user virus from 208.44.210.15
Jan  1 09:07:43 fw sshd[66567]: Invalid user cyrus from 208.44.210.15
Jan  1 09:07:43 fw sshd[66569]: Invalid user staff from 208.44.210.15
Jan  1 09:07:44 fw sshd[66571]: Invalid user oracle from 208.44.210.15

In our 'periodic daily' report/email, (only the list goes on for 
hundreds of attempts). Anyhow, long story short; is there not an easy 
way to make sshd block or deny hosts temporarily if X number of 
invalid login attempts are made within a minute's time? Must I use an 
external wrapper to accomplish this, or can it be done with options 
to sshd on it's own?


There are several ways to block the attacks, one pointed out by first 
respondent, we use Denyhosts and sshblock here.


Google should point you several others.
http://www.google.se/search?hl=en&q=ssh+attacks&btnG=Google+Search
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to 
"[EMAIL PROTECTED]"


As I have mentioned before here on this list, we use Blockhosts which 
has been extremely effective in blocking these after X number of attempts.


You can find it here:

http://www.aczoom.com/cms/blockhosts

Give it a go, I think you'll be very happy with the results.

Michael

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: sshd break-in attempt

2007-01-03 Thread Peter Nyamukusa
On Tuesday 02 January 2007 16:34, Eric wrote:
Hi,

Why don't you use the /etc/rc.firewall, its a good firewall too.

> Len Conrad wrote:
> >> In our 'periodic daily' report/email, (only the list goes on for
> >> hundreds of attempts). Anyhow, long story short; is there not an easy
> >> way to make sshd block or deny hosts temporarily if X number of
> >> invalid login attempts are made within a minute's time?
> >
> > to reduce the brute force attacks + voluminous logging, tell sshd to
> > listen on port other than 22.
> >
> > google for "tcp wrappers sshd" for examples of how to use tcp wrappers
> > in reactive blocking
> >
> > Len
>
> check out the denyhosts port as well. works great
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "[EMAIL PROTECTED]"

-- 
Peter Nyamukusa
Systems Administrator
Africa Online Zimbabwe
Tel:    +263-4-250890
Fax:    +263-4-702203
E-mail: [EMAIL PROTECTED]
AIM:   petenya

Africa Online Disclaimer and Confidentiality Note 

This e-mail, its attachments and any rights attaching hereto are, 
unless the context clearly indicates otherwise, the property of 
Africa Online Holdings (Mauritius) Limited and/or its subsidiaries 
("the Group"). It is confidential and intended for the addressee 
only. Should you not be the addressee and have received this e-mail 
by mistake, kindly notify the sender, delete this e-mail 
immediately and do not disclose or use the same in any manner 
whatsoever. Views and opinions expressed in this e-mail are those 
of the sender unless clearly stated as those of the Group. The 
Group accepts no liability whatsoever for any loss or damages, 
however incurred, resulting from the use of this e-mail or its 
attachments. The Group does not warrant the integrity of this 
e-mail, nor that it is free of errors, viruses, interception or 
interference. For more information about Africa Online, please 
visit our website at http://www.africaonline.com
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: sshd break-in attempt

2007-01-02 Thread Per olof Ljungmark

Nathan Vidican wrote:
We keep getting attempts from what look like a username/password scanner 
utility to login to our servers externally via sshd. Thankfully, we're 
not ignorant enough to leave common account names open, however it is 
annoying to say the least. We're getting things like this:


Jan  1 09:07:34 fw sshd[66547]: Invalid user staff from 208.44.210.15
Jan  1 09:07:35 fw sshd[66549]: Invalid user sales from 208.44.210.15
Jan  1 09:07:36 fw sshd[66551]: Invalid user recruit from 208.44.210.15
Jan  1 09:07:37 fw sshd[66553]: Invalid user alias from 208.44.210.15
Jan  1 09:07:38 fw sshd[66555]: Invalid user office from 208.44.210.15
Jan  1 09:07:38 fw sshd[66557]: Invalid user samba from 208.44.210.15
Jan  1 09:07:39 fw sshd[66559]: Invalid user tomcat from 208.44.210.15
Jan  1 09:07:40 fw sshd[66561]: Invalid user webadmin from 208.44.210.15
Jan  1 09:07:41 fw sshd[66563]: Invalid user spam from 208.44.210.15
Jan  1 09:07:42 fw sshd[66565]: Invalid user virus from 208.44.210.15
Jan  1 09:07:43 fw sshd[66567]: Invalid user cyrus from 208.44.210.15
Jan  1 09:07:43 fw sshd[66569]: Invalid user staff from 208.44.210.15
Jan  1 09:07:44 fw sshd[66571]: Invalid user oracle from 208.44.210.15

In our 'periodic daily' report/email, (only the list goes on for 
hundreds of attempts). Anyhow, long story short; is there not an easy 
way to make sshd block or deny hosts temporarily if X number of invalid 
login attempts are made within a minute's time? Must I use an external 
wrapper to accomplish this, or can it be done with options to sshd on 
it's own?


There are several ways to block the attacks, one pointed out by first 
respondent, we use Denyhosts and sshblock here.


Google should point you several others.
http://www.google.se/search?hl=en&q=ssh+attacks&btnG=Google+Search
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: sshd break-in attempt

2007-01-02 Thread Eric

Len Conrad wrote:




In our 'periodic daily' report/email, (only the list goes on for 
hundreds of attempts). Anyhow, long story short; is there not an easy 
way to make sshd block or deny hosts temporarily if X number of 
invalid login attempts are made within a minute's time?


to reduce the brute force attacks + voluminous logging, tell sshd to 
listen on port other than 22.


google for "tcp wrappers sshd" for examples of how to use tcp wrappers 
in reactive blocking


Len




check out the denyhosts port as well. works great
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: sshd break-in attempt

2007-01-02 Thread Len Conrad




In our 'periodic daily' report/email, (only the list goes on for 
hundreds of attempts). Anyhow, long story short; is there not an 
easy way to make sshd block or deny hosts temporarily if X number of 
invalid login attempts are made within a minute's time?


to reduce the brute force attacks + voluminous logging, tell sshd to 
listen on port other than 22.


google for "tcp wrappers sshd" for examples of how to use tcp 
wrappers in reactive blocking


Len





___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


sshd break-in attempt

2007-01-02 Thread Robert Huff
Nathan Vidican writes:

>  In our 'periodic daily' report/email, (only the list goes on for
>  hundreds of attempts). Anyhow, long story short; is there not an
>  easy way to make sshd block or deny hosts temporarily if X number of
>  invalid login attempts are made within a minute's time? Must I use
>  an external wrapper to accomplish this, or can it be done with
>  options to sshd on it's own? 

I don't know of any internal-to-ssh way to do this.  Me, I use
security/denyhosts; it's a minor pain to configure though that only
need be done once.


Robert Huff
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


sshd break-in attempt

2007-01-02 Thread Nathan Vidican
We keep getting attempts from what look like a username/password scanner 
utility to login to our servers externally via sshd. Thankfully, we're 
not ignorant enough to leave common account names open, however it is 
annoying to say the least. We're getting things like this:


Jan  1 09:07:34 fw sshd[66547]: Invalid user staff from 208.44.210.15
Jan  1 09:07:35 fw sshd[66549]: Invalid user sales from 208.44.210.15
Jan  1 09:07:36 fw sshd[66551]: Invalid user recruit from 208.44.210.15
Jan  1 09:07:37 fw sshd[66553]: Invalid user alias from 208.44.210.15
Jan  1 09:07:38 fw sshd[66555]: Invalid user office from 208.44.210.15
Jan  1 09:07:38 fw sshd[66557]: Invalid user samba from 208.44.210.15
Jan  1 09:07:39 fw sshd[66559]: Invalid user tomcat from 208.44.210.15
Jan  1 09:07:40 fw sshd[66561]: Invalid user webadmin from 208.44.210.15
Jan  1 09:07:41 fw sshd[66563]: Invalid user spam from 208.44.210.15
Jan  1 09:07:42 fw sshd[66565]: Invalid user virus from 208.44.210.15
Jan  1 09:07:43 fw sshd[66567]: Invalid user cyrus from 208.44.210.15
Jan  1 09:07:43 fw sshd[66569]: Invalid user staff from 208.44.210.15
Jan  1 09:07:44 fw sshd[66571]: Invalid user oracle from 208.44.210.15

In our 'periodic daily' report/email, (only the list goes on for hundreds of 
attempts). Anyhow, long story short; is there not an easy way to make sshd 
block or deny hosts temporarily if X number of invalid login attempts are made 
within a minute's time? Must I use an external wrapper to accomplish this, or 
can it be done with options to sshd on it's own?

--
Nathan Vidican
[EMAIL PROTECTED]
Windsor Match Plate & Tool Ltd.
http://www.wmptl.com/


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"