Re: [WISPA] Crude dictionary attack via ssh

2009-05-05 Thread Josh Luthman
That's what denyhosts uses.

On 5/5/09, jp  wrote:
> I'm suprised nobody else has mentioned this...
>
> hosts.allow/hosts.deny
>
> It's simple, and dosen't depend on the firewall software to be running.
>
> hosts.deny allows you to deny access from all IPs (or specific ones)
> hosts.allow lets you override the deny file with the IP ranges or less
> securely the domain
> names of hosts you wish to allow.
>
> We do it on all servers, and allow SSH access only as needed. Problem
> prevented instead of
> problem solved.
>
> If staff needs to get into our servers while traveling, they can VPN into
> our
> VPN servers and then they'd have access.
>
> If it's a backend server, also consider not putting a public IP on it. We
> have lots of
> servers running 10.x IP numbers that don't need to be accessed from the
> Internet. Things
> like radio/snmp monitoring, xen hypervisors, workstations, office file
> servers, etc...
>
> On Fri, May 01, 2009 at 06:22:22PM -0700, Tom Sharples wrote:
>> Spotted this a few minutes ago on one of our back-end servers. Didn't
>> work, but worth noting.
>>
>> Tom S.
>>
>> May  2 01:05:12 QORVUS1 sshd[21728]: Illegal user lieu from 213.165.154.53
>> May  2 01:05:13 QORVUS1 sshd[21730]: Illegal user lilly from
>> 213.165.154.53
>> May  2 01:05:15 QORVUS1 sshd[21739]: Illegal user linda from
>> 213.165.154.53
>> May  2 01:05:17 QORVUS1 sshd[21751]: Illegal user ling from 213.165.154.53
>> May  2 01:05:18 QORVUS1 sshd[21754]: Illegal user lionel from
>> 213.165.154.53
>> May  2 01:05:20 QORVUS1 sshd[21761]: Illegal user lis from 213.165.154.53
>> May  2 01:05:22 QORVUS1 sshd[21763]: Illegal user lisa from 213.165.154.53
>> May  2 01:05:22 QORVUS1 kernel: multicast
>> May  2 01:05:23 QORVUS1 sshd[21765]: Illegal user liv from 213.165.154.53
>> May  2 01:05:25 QORVUS1 sshd[21768]: Illegal user liz from 213.165.154.53
>> May  2 01:05:26 QORVUS1 sshd[21806]: Illegal user liza from 213.165.154.53
>> May  2 01:05:28 QORVUS1 sshd[21808]: Illegal user loan from 213.165.154.53
>> May  2 01:05:30 QORVUS1 sshd[21810]: Illegal user logan from
>> 213.165.154.53
>> May  2 01:05:31 QORVUS1 sshd[21812]: Illegal user lois from 213.165.154.53
>> May  2 01:05:33 QORVUS1 sshd[21814]: Illegal user lok from 213.165.154.53
>> May  2 01:05:35 QORVUS1 sshd[21817]: Illegal user loki from 213.165.154.53
>> May  2 01:05:37 QORVUS1 sshd[21819]: Illegal user lola from 213.165.154.53
>> May  2 01:05:38 QORVUS1 sshd[21821]: Illegal user long from 213.165.154.53
>> May  2 01:05:40 QORVUS1 sshd[21823]: Illegal user lorena from
>> 213.165.154.53
>> May  2 01:05:42 QORVUS1 sshd[21825]: Illegal user lorene from
>> 213.165.154.53
>> May  2 01:05:43 QORVUS1 sshd[21827]: Illegal user lorenzo from
>> 213.165.154.53
>> May  2 01:05:45 QORVUS1 sshd[21830]: Illegal user lorna from
>> 213.165.154.53
>> May  2 01:05:46 QORVUS1 sshd[21868]: Illegal user lotus from
>> 213.165.154.53
>> May  2 01:05:48 QORVUS1 sshd[21870]: Illegal user lou from 213.165.154.53
>> May  2 01:05:50 QORVUS1 sshd[21881]: Illegal user louis from
>> 213.165.154.53
>> May  2 01:05:51 QORVUS1 sshd[21888]: Illegal user luca from 213.165.154.53
>> May  2 01:05:53 QORVUS1 sshd[21891]: Illegal user lucas from
>> 213.165.154.53
>> May  2 01:05:55 QORVUS1 sshd[21906]: Illegal user lucian from
>> 213.165.154.53
>> May  2 01:05:56 QORVUS1 sshd[21912]: Illegal user lucky from
>> 213.165.154.53
>> May  2 01:05:58 QORVUS1 sshd[21917]: Illegal user lucy from 213.165.154.53
>> May  2 01:05:59 QORVUS1 sshd[21921]: Illegal user ludwig from
>> 213.165.154.53
>> May  2 01:06:01 QORVUS1 sshd[21923]: Illegal user luigi from
>> 213.165.154.53
>> May  2 01:06:03 QORVUS1 sshd[22065]: Illegal user luis from 213.165.154.53
>> May  2 01:06:04 QORVUS1 sshd[22069]: Illegal user luke from 213.165.154.53
>> May  2 01:06:06 QORVUS1 sshd[22089]: Illegal user luna from 213.165.154.53
>> May  2 01:06:07 QORVUS1 sshd[22110]: Illegal user lupe from 213.165.154.53
>> May  2 01:06:09 QORVUS1 sshd[22112]: Illegal user luther from
>> 213.165.154.53
>> May  2 01:06:11 QORVUS1 sshd[22114]: Illegal user luz from 213.165.154.53
>> May  2 01:06:12 QORVUS1 sshd[22116]: Illegal user ly from 213.165.154.53
>> May  2 01:06:14 QORVUS1 sshd[22118]: Illegal user lyn from 213.165.154.53
>> May  2 01:06:15 QORVUS1 sshd[22121]: Illegal user lynda from
>> 213.165.154.53
>> May  2 01:06:17 QORVUS1 sshd[22123]: Illegal user lynn from 213.165.154.53
>> May  2 01:06:19 QORVUS1 sshd[22125]: Illegal user lysa from 213.165.154.53
>> May  2 01:06:20 QORVUS1 sshd[22127]: Illegal user mac from 213.165.154.53
>> May  2 01:06:22 QORVUS1 kernel: multicast
>> May  2 01:06:22 QORVUS1 sshd[22129]: Illegal user macy from 213.165.154.53
>> May  2 01:06:24 QORVUS1 sshd[22131]: Illegal user mae from 213.165.154.53
>> May  2 01:06:25 QORVUS1 sshd[22134]: Illegal user pwla from 213.165.154.53
>> May  2 01:06:27 QORVUS1 sshd[22172]: Illegal user mama from 213.165.154.53
>> May  2 01:06:28 QORVUS1 sshd[22181]: Illegal user maeko from
>> 213

Re: [WISPA] Crude dictionary attack via ssh

2009-05-05 Thread jp
I'm suprised nobody else has mentioned this...

hosts.allow/hosts.deny

It's simple, and dosen't depend on the firewall software to be running.

hosts.deny allows you to deny access from all IPs (or specific ones)
hosts.allow lets you override the deny file with the IP ranges or less securely 
the domain 
names of hosts you wish to allow.

We do it on all servers, and allow SSH access only as needed. Problem prevented 
instead of 
problem solved.

If staff needs to get into our servers while traveling, they can VPN into our
VPN servers and then they'd have access.

If it's a backend server, also consider not putting a public IP on it. We have 
lots of
servers running 10.x IP numbers that don't need to be accessed from the 
Internet. Things 
like radio/snmp monitoring, xen hypervisors, workstations, office file servers, 
etc...

On Fri, May 01, 2009 at 06:22:22PM -0700, Tom Sharples wrote:
> Spotted this a few minutes ago on one of our back-end servers. Didn't work, 
> but worth noting.
> 
> Tom S.
> 
> May  2 01:05:12 QORVUS1 sshd[21728]: Illegal user lieu from 213.165.154.53
> May  2 01:05:13 QORVUS1 sshd[21730]: Illegal user lilly from 213.165.154.53
> May  2 01:05:15 QORVUS1 sshd[21739]: Illegal user linda from 213.165.154.53
> May  2 01:05:17 QORVUS1 sshd[21751]: Illegal user ling from 213.165.154.53
> May  2 01:05:18 QORVUS1 sshd[21754]: Illegal user lionel from 213.165.154.53
> May  2 01:05:20 QORVUS1 sshd[21761]: Illegal user lis from 213.165.154.53
> May  2 01:05:22 QORVUS1 sshd[21763]: Illegal user lisa from 213.165.154.53
> May  2 01:05:22 QORVUS1 kernel: multicast
> May  2 01:05:23 QORVUS1 sshd[21765]: Illegal user liv from 213.165.154.53
> May  2 01:05:25 QORVUS1 sshd[21768]: Illegal user liz from 213.165.154.53
> May  2 01:05:26 QORVUS1 sshd[21806]: Illegal user liza from 213.165.154.53
> May  2 01:05:28 QORVUS1 sshd[21808]: Illegal user loan from 213.165.154.53
> May  2 01:05:30 QORVUS1 sshd[21810]: Illegal user logan from 213.165.154.53
> May  2 01:05:31 QORVUS1 sshd[21812]: Illegal user lois from 213.165.154.53
> May  2 01:05:33 QORVUS1 sshd[21814]: Illegal user lok from 213.165.154.53
> May  2 01:05:35 QORVUS1 sshd[21817]: Illegal user loki from 213.165.154.53
> May  2 01:05:37 QORVUS1 sshd[21819]: Illegal user lola from 213.165.154.53
> May  2 01:05:38 QORVUS1 sshd[21821]: Illegal user long from 213.165.154.53
> May  2 01:05:40 QORVUS1 sshd[21823]: Illegal user lorena from 213.165.154.53
> May  2 01:05:42 QORVUS1 sshd[21825]: Illegal user lorene from 213.165.154.53
> May  2 01:05:43 QORVUS1 sshd[21827]: Illegal user lorenzo from 213.165.154.53
> May  2 01:05:45 QORVUS1 sshd[21830]: Illegal user lorna from 213.165.154.53
> May  2 01:05:46 QORVUS1 sshd[21868]: Illegal user lotus from 213.165.154.53
> May  2 01:05:48 QORVUS1 sshd[21870]: Illegal user lou from 213.165.154.53
> May  2 01:05:50 QORVUS1 sshd[21881]: Illegal user louis from 213.165.154.53
> May  2 01:05:51 QORVUS1 sshd[21888]: Illegal user luca from 213.165.154.53
> May  2 01:05:53 QORVUS1 sshd[21891]: Illegal user lucas from 213.165.154.53
> May  2 01:05:55 QORVUS1 sshd[21906]: Illegal user lucian from 213.165.154.53
> May  2 01:05:56 QORVUS1 sshd[21912]: Illegal user lucky from 213.165.154.53
> May  2 01:05:58 QORVUS1 sshd[21917]: Illegal user lucy from 213.165.154.53
> May  2 01:05:59 QORVUS1 sshd[21921]: Illegal user ludwig from 213.165.154.53
> May  2 01:06:01 QORVUS1 sshd[21923]: Illegal user luigi from 213.165.154.53
> May  2 01:06:03 QORVUS1 sshd[22065]: Illegal user luis from 213.165.154.53
> May  2 01:06:04 QORVUS1 sshd[22069]: Illegal user luke from 213.165.154.53
> May  2 01:06:06 QORVUS1 sshd[22089]: Illegal user luna from 213.165.154.53
> May  2 01:06:07 QORVUS1 sshd[22110]: Illegal user lupe from 213.165.154.53
> May  2 01:06:09 QORVUS1 sshd[22112]: Illegal user luther from 213.165.154.53
> May  2 01:06:11 QORVUS1 sshd[22114]: Illegal user luz from 213.165.154.53
> May  2 01:06:12 QORVUS1 sshd[22116]: Illegal user ly from 213.165.154.53
> May  2 01:06:14 QORVUS1 sshd[22118]: Illegal user lyn from 213.165.154.53
> May  2 01:06:15 QORVUS1 sshd[22121]: Illegal user lynda from 213.165.154.53
> May  2 01:06:17 QORVUS1 sshd[22123]: Illegal user lynn from 213.165.154.53
> May  2 01:06:19 QORVUS1 sshd[22125]: Illegal user lysa from 213.165.154.53
> May  2 01:06:20 QORVUS1 sshd[22127]: Illegal user mac from 213.165.154.53
> May  2 01:06:22 QORVUS1 kernel: multicast
> May  2 01:06:22 QORVUS1 sshd[22129]: Illegal user macy from 213.165.154.53
> May  2 01:06:24 QORVUS1 sshd[22131]: Illegal user mae from 213.165.154.53
> May  2 01:06:25 QORVUS1 sshd[22134]: Illegal user pwla from 213.165.154.53
> May  2 01:06:27 QORVUS1 sshd[22172]: Illegal user mama from 213.165.154.53
> May  2 01:06:28 QORVUS1 sshd[22181]: Illegal user maeko from 213.165.154.53
> May  2 01:06:30 QORVUS1 sshd[22190]: Illegal user magda from 213.165.154.53
> May  2 01:06:32 QORVUS1 sshd[22192]: Illegal user maggie from 213.165.154.53
> May  2 01:06:33 QORVUS1 s

Re: [WISPA] Crude dictionary attack via ssh

2009-05-04 Thread Butch Evans
On Mon, 2009-05-04 at 09:37 -0400, Patrick Shoemaker wrote:
> Just to follow up on this thought, the main "unintended consequence" I 
> had in mind was a customer running some sort of security verification 
> suite against his/her own servers. If I were an IT employee using this 
> sort of software from outside my network, and all of a sudden certain 
> IPs or subnets can no longer access my company's network for some 
> unknown reason, I would not be pleased. I would be expecting my ISP to 
> get packets from point A to point B, not to babysit connections for me.

While I agree that this scenario is an accurate example of one that
would create a false positive to the method I use, it is a stretch to
call it "normal".  I'd bet that if we took a poll here, that we'd find
that over 90% (maybe more) of the customer base represented is
residential.  Additionally, I suspect that at least 80% of the business
accounts represented here would not create a false positive.  This
leaves only 2% in the "at risk" category.  It's a very small risk, in my
opinion. 

Furthermore, I've installed this type of solution at the headend of at
least 80 networks.  Some of these have been running for at least 2
years.  I have yet to hear a complaint from my customers (the ISPs).  

I think that if we assume the 2% number above is accurate (it may be
very high), that it is worth the risk to prevent the propagation of this
attack mechanism.  That's what these things do, by the way.  Once a
successful login occurs, that machine becomes a bot that is performing
the ssh attack itself.  Not only does it do that, but it is a likely
host to become a spambot as well.

It may be that your specific situation makes this approach the wrong
choice.  If it does, I can only say that your network is an exception
and not the "rule" in this case.

-- 

* Butch Evans   * Professional Network Consultation*
* http://www.butchevans.com/* Network Engineering  *
* http://www.wispa.org/ * WISPA Board Member   *
* http://blog.butchevans.com/   * Wired or Wireless Networks   *






WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-04 Thread Matt
Very simple effective fix if you have iptables:

iptables -A INPUT -p tcp --dport 22 -s your_subnet/21 -j ACCEPT

iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --set
--name SSH

iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --update
--seconds 60 --hitcount 3 --rttl --name SSH -j LOG --log-prefix 'SSH attack:
'

iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --update
--seconds 60 --hitcount 3 --rttl --name SSH -j DROP

Replace your subnet with the IP pool you never want to block.  After its
working do 'service iptables save' to save it.  This stopped all problems
like this for me.

Matt


> Spotted this a few minutes ago on one of our back-end servers. Didn't
work, but worth noting.
>
> Tom S.
>
> May  2 01:05:12 QORVUS1 sshd[21728]: Illegal user lieu from 213.165.154.53
> May  2 01:05:13 QORVUS1 sshd[21730]: Illegal user lilly from
213.165.154.53
> May  2 01:05:15 QORVUS1 sshd[21739]: Illegal user linda from
213.165.154.53
> May  2 01:05:17 QORVUS1 sshd[21751]: Illegal user ling from 213.165.154.53
> May  2 01:05:18 QORVUS1 sshd[21754]: Illegal user lionel from
213.165.154.53
> May  2 01:05:20 QORVUS1 sshd[21761]: Illegal user lis from 213.165.154.53
> May  2 01:05:22 QORVUS1 sshd[21763]: Illegal user lisa from 213.165.154.53
> May  2 01:05:22 QORVUS1 kernel: multicast
> May  2 01:05:23 QORVUS1 sshd[21765]: Illegal user liv from 213.165.154.53
> May  2 01:05:25 QORVUS1 sshd[21768]: Illegal user liz from 213.165.154.53
> May  2 01:05:26 QORVUS1 sshd[21806]: Illegal user liza from 213.165.154.53
> May  2 01:05:28 QORVUS1 sshd[21808]: Illegal user loan from 213.165.154.53
> May  2 01:05:30 QORVUS1 sshd[21810]: Illegal user logan from
213.165.154.53
> May  2 01:05:31 QORVUS1 sshd[21812]: Illegal user lois from 213.165.154.53
> May  2 01:05:33 QORVUS1 sshd[21814]: Illegal user lok from 213.165.154.53
> May  2 01:05:35 QORVUS1 sshd[21817]: Illegal user loki from 213.165.154.53
> May  2 01:05:37 QORVUS1 sshd[21819]: Illegal user lola from 213.165.154.53
> May  2 01:05:38 QORVUS1 sshd[21821]: Illegal user long from 213.165.154.53
> May  2 01:05:40 QORVUS1 sshd[21823]: Illegal user lorena from
213.165.154.53
> May  2 01:05:42 QORVUS1 sshd[21825]: Illegal user lorene from
213.165.154.53
> May  2 01:05:43 QORVUS1 sshd[21827]: Illegal user lorenzo from
213.165.154.53
> May  2 01:05:45 QORVUS1 sshd[21830]: Illegal user lorna from
213.165.154.53
> May  2 01:05:46 QORVUS1 sshd[21868]: Illegal user lotus from
213.165.154.53
> May  2 01:05:48 QORVUS1 sshd[21870]: Illegal user lou from 213.165.154.53
> May  2 01:05:50 QORVUS1 sshd[21881]: Illegal user louis from
213.165.154.53
> May  2 01:05:51 QORVUS1 sshd[21888]: Illegal user luca from 213.165.154.53
> May  2 01:05:53 QORVUS1 sshd[21891]: Illegal user lucas from
213.165.154.53
> May  2 01:05:55 QORVUS1 sshd[21906]: Illegal user lucian from
213.165.154.53
> May  2 01:05:56 QORVUS1 sshd[21912]: Illegal user lucky from
213.165.154.53
> May  2 01:05:58 QORVUS1 sshd[21917]: Illegal user lucy from 213.165.154.53
> May  2 01:05:59 QORVUS1 sshd[21921]: Illegal user ludwig from
213.165.154.53
> May  2 01:06:01 QORVUS1 sshd[21923]: Illegal user luigi from
213.165.154.53
> May  2 01:06:03 QORVUS1 sshd[22065]: Illegal user luis from 213.165.154.53
> May  2 01:06:04 QORVUS1 sshd[22069]: Illegal user luke from 213.165.154.53
> May  2 01:06:06 QORVUS1 sshd[22089]: Illegal user luna from 213.165.154.53
> May  2 01:06:07 QORVUS1 sshd[22110]: Illegal user lupe from 213.165.154.53
> May  2 01:06:09 QORVUS1 sshd[22112]: Illegal user luther from
213.165.154.53
> May  2 01:06:11 QORVUS1 sshd[22114]: Illegal user luz from 213.165.154.53
> May  2 01:06:12 QORVUS1 sshd[22116]: Illegal user ly from 213.165.154.53
> May  2 01:06:14 QORVUS1 sshd[22118]: Illegal user lyn from 213.165.154.53
> May  2 01:06:15 QORVUS1 sshd[22121]: Illegal user lynda from
213.165.154.53
> May  2 01:06:17 QORVUS1 sshd[22123]: Illegal user lynn from 213.165.154.53
> May  2 01:06:19 QORVUS1 sshd[22125]: Illegal user lysa from 213.165.154.53
> May  2 01:06:20 QORVUS1 sshd[22127]: Illegal user mac from 213.165.154.53
> May  2 01:06:22 QORVUS1 kernel: multicast
> May  2 01:06:22 QORVUS1 sshd[22129]: Illegal user macy from 213.165.154.53
> May  2 01:06:24 QORVUS1 sshd[22131]: Illegal user mae from 213.165.154.53
> May  2 01:06:25 QORVUS1 sshd[22134]: Illegal user pwla from 213.165.154.53
> May  2 01:06:27 QORVUS1 sshd[22172]: Illegal user mama from 213.165.154.53
> May  2 01:06:28 QORVUS1 sshd[22181]: Illegal user maeko from
213.165.154.53
> May  2 01:06:30 QORVUS1 sshd[22190]: Illegal user magda from
213.165.154.53
> May  2 01:06:32 QORVUS1 sshd[22192]: Illegal user maggie from
213.165.154.53
> May  2 01:06:33 QORVUS1 sshd[22204]: Illegal user mai from 213.165.154.53
> May  2 01:06:35 QORVUS1 sshd[22214]: Illegal user maia from 213.165.154.53
> May  2 01:06:36 QORVUS1 sshd[0]: Illegal user makoto from
213.165.154.53
> May  2 01:06:38 QORVUS1 sshd[3]: Illega

Re: [WISPA] Crude dictionary attack via ssh

2009-05-04 Thread Patrick Shoemaker
I was thinking of the case where the IT person is running the security 
audit tool from a trusted network, like a branch office or their home 
connection.

Probably an obscure case. But annoying if a customer ever gets burned by it.

My philosophy is that the ISP should be responsible for the most basic 
network-level protections, such as uRPF enforcement, blocking RFC1918 
address space, etc. Any fiddling above layer 3 should be done on an 
opt-in basis.

This is what works for my customer base (no residential), YMMV. Not 
saying it's what should be done in every case.

Patrick Shoemaker
Vector Data Systems LLC
shoemak...@vectordatasystems.com
office: (301) 358-1690 x36
http://www.vectordatasystems.com


Josh Luthman wrote:
> Patrick,
> 
> I agree with that argument but I don't think anyone here has ever seen that
> problem before.  IPs are allocated to organizations.  If you block the
> "Chinese hacker" organization then how many subs are going to be complaining
> about that?
> 
> Josh Luthman
> Office: 937-552-2340
> Direct: 937-552-2343
> 1100 Wayne St
> Suite 1337
> Troy, OH 45373
> 
> "When you have eliminated the impossible, that which remains, however
> improbable, must be the truth."
> --- Sir Arthur Conan Doyle
> 
> 
> On Mon, May 4, 2009 at 9:37 AM, Patrick Shoemaker <
> shoemak...@vectordatasystems.com> wrote:
> 
>> Just to follow up on this thought, the main "unintended consequence" I
>> had in mind was a customer running some sort of security verification
>> suite against his/her own servers. If I were an IT employee using this
>> sort of software from outside my network, and all of a sudden certain
>> IPs or subnets can no longer access my company's network for some
>> unknown reason, I would not be pleased. I would be expecting my ISP to
>> get packets from point A to point B, not to babysit connections for me.
>>
>> If this feature were offered as an opt-in service, then it would be a
>> completely different story.
>>
>> Of course, this probably isn't an issue at all for most residential and
>> SMB customers.
>>
>> Patrick Shoemaker
>> Vector Data Systems LLC
>> shoemak...@vectordatasystems.com
>> office: (301) 358-1690 x36
>> http://www.vectordatasystems.com
>>
>>
>> Butch Evans wrote:
>>> On Sat, 2009-05-02 at 17:51 -0400, Patrick Shoemaker wrote:
 There's another linux program out there called BFD that does the same
 thing: parses logs and creates IPTABLES rules, but it doesn't use
 python. Google it and see if it will work for your application.
>>> Again, this is a good approach, but is (for my taste) a little to
>>> reactive.  The approach that Eje was speaking of is more proactive.  It
>>> is the same approach that I take when providing firewall applications to
>>> my own customers.  It goes a little like this:
>>>
>>> Create a firewall for the router itself that will explicitly permit all
>>> of the traffic you wish to allow to connect via ftp or ssh.  How you
>>> accomplish this is up to you.
>>>
>>> Watch for connections by ssh/ftp/other that are NOT valid.  Grab the
>>> source address of those offending ssh attacks.
>>>
>>> In the firewall that protects your network, deny all traffic from those
>>> that were detected as attempting to connect to your firewall router.
>>>
>>> Watch for NEW ssh connections and set some reasonable limit for how
>>> often a specific IP may attempt a new ssh connection.  You have to pick
>>> the right number here in order to prevent false positives.  It's all
>>> about finding an appropriate rate of new connection attempts.
>>>
>>> If an IP "trips" the above set of rules, then deny them further traffic
>>> into the network.
>>>
>>> It's really not that complicated.  It's not "easy" maybe, but not
>>> complicated.  You simply have to have a router with some decent firewall
>>> capability (iptables based).
>>>
>>>
 Also, this might go without saying, but I'd recommend against applying
 any router-based rules to customer subnets. That approach is ripe for
 unintended consequences, and can create a troubleshooting nightmare for
 your customers.
>>> I disagree.  Done right, you don't have "unintended consequences".  And
>>> even if you do, it's rather easy to take care of those as they come
>>> up.
>>>
>>
>>
>> 
>> WISPA Wants You! Join today!
>> http://signup.wispa.org/
>>
>> 
>>
>> WISPA Wireless List: wireless@wispa.org
>>
>> Subscribe/Unsubscribe:
>> http://lists.wispa.org/mailman/listinfo/wireless
>>
>> Archives: http://lists.wispa.org/pipermail/wireless/
>>
> 
> 
> 
> WISPA Wants You! Join today!
> http://signup.wispa.org/
> 
>  
> WISPA Wireless List: wireless@wispa.org
> 
> Subscribe/Unsubscribe:
> http://li

Re: [WISPA] Crude dictionary attack via ssh

2009-05-04 Thread Patrick Shoemaker
Just to follow up on this thought, the main "unintended consequence" I 
had in mind was a customer running some sort of security verification 
suite against his/her own servers. If I were an IT employee using this 
sort of software from outside my network, and all of a sudden certain 
IPs or subnets can no longer access my company's network for some 
unknown reason, I would not be pleased. I would be expecting my ISP to 
get packets from point A to point B, not to babysit connections for me.

If this feature were offered as an opt-in service, then it would be a 
completely different story.

Of course, this probably isn't an issue at all for most residential and 
SMB customers.

Patrick Shoemaker
Vector Data Systems LLC
shoemak...@vectordatasystems.com
office: (301) 358-1690 x36
http://www.vectordatasystems.com


Butch Evans wrote:
> On Sat, 2009-05-02 at 17:51 -0400, Patrick Shoemaker wrote:
>> There's another linux program out there called BFD that does the same 
>> thing: parses logs and creates IPTABLES rules, but it doesn't use 
>> python. Google it and see if it will work for your application.
> 
> Again, this is a good approach, but is (for my taste) a little to
> reactive.  The approach that Eje was speaking of is more proactive.  It
> is the same approach that I take when providing firewall applications to
> my own customers.  It goes a little like this:
> 
> Create a firewall for the router itself that will explicitly permit all
> of the traffic you wish to allow to connect via ftp or ssh.  How you
> accomplish this is up to you.
> 
> Watch for connections by ssh/ftp/other that are NOT valid.  Grab the
> source address of those offending ssh attacks.
> 
> In the firewall that protects your network, deny all traffic from those
> that were detected as attempting to connect to your firewall router.  
> 
> Watch for NEW ssh connections and set some reasonable limit for how
> often a specific IP may attempt a new ssh connection.  You have to pick
> the right number here in order to prevent false positives.  It's all
> about finding an appropriate rate of new connection attempts.
> 
> If an IP "trips" the above set of rules, then deny them further traffic
> into the network.  
> 
> It's really not that complicated.  It's not "easy" maybe, but not
> complicated.  You simply have to have a router with some decent firewall
> capability (iptables based).
> 
> 
>> Also, this might go without saying, but I'd recommend against applying 
>> any router-based rules to customer subnets. That approach is ripe for 
>> unintended consequences, and can create a troubleshooting nightmare for 
>> your customers.
> 
> I disagree.  Done right, you don't have "unintended consequences".  And
> even if you do, it's rather easy to take care of those as they come
> up.  
> 



WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-04 Thread Josh Luthman
Patrick,

I agree with that argument but I don't think anyone here has ever seen that
problem before.  IPs are allocated to organizations.  If you block the
"Chinese hacker" organization then how many subs are going to be complaining
about that?

Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373

"When you have eliminated the impossible, that which remains, however
improbable, must be the truth."
--- Sir Arthur Conan Doyle


On Mon, May 4, 2009 at 9:37 AM, Patrick Shoemaker <
shoemak...@vectordatasystems.com> wrote:

> Just to follow up on this thought, the main "unintended consequence" I
> had in mind was a customer running some sort of security verification
> suite against his/her own servers. If I were an IT employee using this
> sort of software from outside my network, and all of a sudden certain
> IPs or subnets can no longer access my company's network for some
> unknown reason, I would not be pleased. I would be expecting my ISP to
> get packets from point A to point B, not to babysit connections for me.
>
> If this feature were offered as an opt-in service, then it would be a
> completely different story.
>
> Of course, this probably isn't an issue at all for most residential and
> SMB customers.
>
> Patrick Shoemaker
> Vector Data Systems LLC
> shoemak...@vectordatasystems.com
> office: (301) 358-1690 x36
> http://www.vectordatasystems.com
>
>
> Butch Evans wrote:
> > On Sat, 2009-05-02 at 17:51 -0400, Patrick Shoemaker wrote:
> >> There's another linux program out there called BFD that does the same
> >> thing: parses logs and creates IPTABLES rules, but it doesn't use
> >> python. Google it and see if it will work for your application.
> >
> > Again, this is a good approach, but is (for my taste) a little to
> > reactive.  The approach that Eje was speaking of is more proactive.  It
> > is the same approach that I take when providing firewall applications to
> > my own customers.  It goes a little like this:
> >
> > Create a firewall for the router itself that will explicitly permit all
> > of the traffic you wish to allow to connect via ftp or ssh.  How you
> > accomplish this is up to you.
> >
> > Watch for connections by ssh/ftp/other that are NOT valid.  Grab the
> > source address of those offending ssh attacks.
> >
> > In the firewall that protects your network, deny all traffic from those
> > that were detected as attempting to connect to your firewall router.
> >
> > Watch for NEW ssh connections and set some reasonable limit for how
> > often a specific IP may attempt a new ssh connection.  You have to pick
> > the right number here in order to prevent false positives.  It's all
> > about finding an appropriate rate of new connection attempts.
> >
> > If an IP "trips" the above set of rules, then deny them further traffic
> > into the network.
> >
> > It's really not that complicated.  It's not "easy" maybe, but not
> > complicated.  You simply have to have a router with some decent firewall
> > capability (iptables based).
> >
> >
> >> Also, this might go without saying, but I'd recommend against applying
> >> any router-based rules to customer subnets. That approach is ripe for
> >> unintended consequences, and can create a troubleshooting nightmare for
> >> your customers.
> >
> > I disagree.  Done right, you don't have "unintended consequences".  And
> > even if you do, it's rather easy to take care of those as they come
> > up.
> >
>
>
>
> 
> WISPA Wants You! Join today!
> http://signup.wispa.org/
>
> 
>
> WISPA Wireless List: wireless@wispa.org
>
> Subscribe/Unsubscribe:
> http://lists.wispa.org/mailman/listinfo/wireless
>
> Archives: http://lists.wispa.org/pipermail/wireless/
>



WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-02 Thread Butch Evans
On Sat, 2009-05-02 at 17:51 -0400, Patrick Shoemaker wrote:
> There's another linux program out there called BFD that does the same 
> thing: parses logs and creates IPTABLES rules, but it doesn't use 
> python. Google it and see if it will work for your application.

Again, this is a good approach, but is (for my taste) a little to
reactive.  The approach that Eje was speaking of is more proactive.  It
is the same approach that I take when providing firewall applications to
my own customers.  It goes a little like this:

Create a firewall for the router itself that will explicitly permit all
of the traffic you wish to allow to connect via ftp or ssh.  How you
accomplish this is up to you.

Watch for connections by ssh/ftp/other that are NOT valid.  Grab the
source address of those offending ssh attacks.

In the firewall that protects your network, deny all traffic from those
that were detected as attempting to connect to your firewall router.  

Watch for NEW ssh connections and set some reasonable limit for how
often a specific IP may attempt a new ssh connection.  You have to pick
the right number here in order to prevent false positives.  It's all
about finding an appropriate rate of new connection attempts.

If an IP "trips" the above set of rules, then deny them further traffic
into the network.  

It's really not that complicated.  It's not "easy" maybe, but not
complicated.  You simply have to have a router with some decent firewall
capability (iptables based).


> Also, this might go without saying, but I'd recommend against applying 
> any router-based rules to customer subnets. That approach is ripe for 
> unintended consequences, and can create a troubleshooting nightmare for 
> your customers.

I disagree.  Done right, you don't have "unintended consequences".  And
even if you do, it's rather easy to take care of those as they come
up.  

-- 

* Butch Evans   * Professional Network Consultation*
* http://www.butchevans.com/* Network Engineering  *
* http://www.wispa.org/ * WISPA Board Member   *
* http://blog.butchevans.com/   * Wired or Wireless Networks   *






WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-02 Thread Patrick Shoemaker
There's another linux program out there called BFD that does the same 
thing: parses logs and creates IPTABLES rules, but it doesn't use 
python. Google it and see if it will work for your application.

Also, this might go without saying, but I'd recommend against applying 
any router-based rules to customer subnets. That approach is ripe for 
unintended consequences, and can create a troubleshooting nightmare for 
your customers.

-- 
Patrick Shoemaker
President, Vector Data Systems LLC
shoemak...@vectordatasystems.com
office: (301) 358-1690 x36
http://www.vectordatasystems.com



Tom Sharples wrote:
> I'm writing a reactive bash script this weekend to take care of the problem. 
> Can't load python on these embedded servers, or I'd just use the denyhosts 
> script Josh and George suggested.
> The idea of generating a common database of offending IPs to propagate to 
> all our servers is a good one too, that will be in Version 2 :-)
>
> Thanks,
>
> Tom S.
>
> - Original Message - 
> From: "Butch Evans" 
> To: "Tom Sharples" ; "WISPA General List" 
> 
> Sent: Saturday, May 02, 2009 12:18 PM
> Subject: Re: [WISPA] Crude dictionary attack via ssh
>
>
>   
>> On Fri, 2009-05-01 at 18:36 -0700, Tom Sharples wrote:
>> 
>>> This works too :-)
>>>
>>> iptables -A INPUT -s 213.165.154.53/24 -j DROP
>>>   
>> It does for sure.  The only problem is that this one host is not the
>> only one to be concerned about.  If you have a router at the border of
>> the network that has the capability of watching the network for this
>> type of behaviour and responding to it, then I'd suggest adding that
>> function there.
>>
>> The denyhosts script that Josh suggested works, but it is a reactive
>> script.  In other words, it watches the log file and does what you
>> suggest automatically.  At least that's what I saw the first time I
>> looked at it.
>>
>> A better approach is the one that Eje suggested.  His suggestion uses a
>> router (probably Mikrotik in his case) that watches for this behaviour
>> and drops all traffic from this host automatically.  You can do this
>> with Mikrotik, ImageStream or any other OS that includes iptables and
>> the "recent module".  It's not even that hard to do.
>>
>> -- 
>> 
>> * Butch Evans   * Professional Network Consultation*
>> * http://www.butchevans.com/* Network Engineering  *
>> * http://www.wispa.org/ * WISPA Board Member   *
>> * http://blog.butchevans.com/   * Wired or Wireless Networks   *
>> 
>>
>>
>> 
>
>
>
> 
> WISPA Wants You! Join today!
> http://signup.wispa.org/
> 
>  
> WISPA Wireless List: wireless@wispa.org
>
> Subscribe/Unsubscribe:
> http://lists.wispa.org/mailman/listinfo/wireless
>
> Archives: http://lists.wispa.org/pipermail/wireless/
>   






WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-02 Thread Tom Sharples
I'm writing a reactive bash script this weekend to take care of the problem. 
Can't load python on these embedded servers, or I'd just use the denyhosts 
script Josh and George suggested.
The idea of generating a common database of offending IPs to propagate to 
all our servers is a good one too, that will be in Version 2 :-)

Thanks,

Tom S.

- Original Message - 
From: "Butch Evans" 
To: "Tom Sharples" ; "WISPA General List" 

Sent: Saturday, May 02, 2009 12:18 PM
Subject: Re: [WISPA] Crude dictionary attack via ssh


> On Fri, 2009-05-01 at 18:36 -0700, Tom Sharples wrote:
>> This works too :-)
>>
>> iptables -A INPUT -s 213.165.154.53/24 -j DROP
>
> It does for sure.  The only problem is that this one host is not the
> only one to be concerned about.  If you have a router at the border of
> the network that has the capability of watching the network for this
> type of behaviour and responding to it, then I'd suggest adding that
> function there.
>
> The denyhosts script that Josh suggested works, but it is a reactive
> script.  In other words, it watches the log file and does what you
> suggest automatically.  At least that's what I saw the first time I
> looked at it.
>
> A better approach is the one that Eje suggested.  His suggestion uses a
> router (probably Mikrotik in his case) that watches for this behaviour
> and drops all traffic from this host automatically.  You can do this
> with Mikrotik, ImageStream or any other OS that includes iptables and
> the "recent module".  It's not even that hard to do.
>
> -- 
> 
> * Butch Evans   * Professional Network Consultation*
> * http://www.butchevans.com/* Network Engineering  *
> * http://www.wispa.org/ * WISPA Board Member   *
> * http://blog.butchevans.com/   * Wired or Wireless Networks   *
> 
>
> 




WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-02 Thread Butch Evans
On Fri, 2009-05-01 at 18:36 -0700, Tom Sharples wrote:
> This works too :-)
> 
> iptables -A INPUT -s 213.165.154.53/24 -j DROP

It does for sure.  The only problem is that this one host is not the
only one to be concerned about.  If you have a router at the border of
the network that has the capability of watching the network for this
type of behaviour and responding to it, then I'd suggest adding that
function there. 

The denyhosts script that Josh suggested works, but it is a reactive
script.  In other words, it watches the log file and does what you
suggest automatically.  At least that's what I saw the first time I
looked at it.  

A better approach is the one that Eje suggested.  His suggestion uses a
router (probably Mikrotik in his case) that watches for this behaviour
and drops all traffic from this host automatically.  You can do this
with Mikrotik, ImageStream or any other OS that includes iptables and
the "recent module".  It's not even that hard to do.

-- 

* Butch Evans   * Professional Network Consultation*
* http://www.butchevans.com/* Network Engineering  *
* http://www.wispa.org/ * WISPA Board Member   *
* http://blog.butchevans.com/   * Wired or Wireless Networks   *






WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-01 Thread Rogelio
Tom Sharples wrote:
> It's a flavor of Slack Linux. Don't have Python on these boxes so am 
> writing a bash script to do essentially the same thing as DenyHosts.

Here's an idea that might work too, assuming you have iptables on that box

http://www.e18.physik.tu-muenchen.de/~tnagel/ipt_recent/



WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-01 Thread Rogelio
Tom Sharples wrote:
 > It's a flavor of Slack Linux. Don't have Python on these boxes so am
 > writing a bash script to do essentially the same thing as DenyHosts.

You run iptables on this box?  You might have some options there, as well.



WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-01 Thread Tom Sharples
It's a flavor of Slack Linux. Don't have Python on these boxes so am writing 
a bash script to do essentially the same thing as DenyHosts.

Tom S.

- Original Message - 
From: "Rogelio" 
To: "Tom Sharples" ; "WISPA General List" 

Sent: Friday, May 01, 2009 10:53 PM
Subject: Re: [WISPA] Crude dictionary attack via ssh


> Tom Sharples wrote:
>> Spotted this a few minutes ago on one of our back-end servers. Didn't 
>> work, but worth noting.
>
> Which OS are you running?
> 




WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-01 Thread Rogelio
Tom Sharples wrote:
> Spotted this a few minutes ago on one of our back-end servers. Didn't work, 
> but worth noting.

Which OS are you running?



WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-01 Thread eje
I do it on my core router and block their ip access to any service on my entire 
network and not just ssh on the linux box itself but any other possible attack 
vector they might throw on any system with public ip. Don't think that they 
will only attack and test ssh ports.  

/Eje
Sent via BlackBerry from T-Mobile

-Original Message-
From: Rogelio 

Date: Fri, 01 May 2009 18:31:41 
To: WISPA General List
Subject: Re: [WISPA] Crude dictionary attack via ssh


Josh Luthman wrote:
> Install DenyHosts and those go away.

ditto

http://denyhosts.sourceforge.net/
http://denyhosts.sourceforge.net/faq.html
http://www.howtoforge.com/preventing_ssh_dictionary_attacks_with_denyhosts

"DenyHosts is a script intended to be run by Linux system administrators 
to help thwart SSH server attacks (also known as dictionary based 
attacks and brute force attacks).

If you've ever looked at your ssh log (/var/log/secure on Redhat, 
/var/log/auth.log on Mandrake, etc...) you may be alarmed to see how 
many hackers attempted to gain access to your server. Hopefully, none of 
them were successful (but then again, how would you know?). Wouldn't it 
be better to automatically prevent that attacker from continuing to gain 
entry into your system?"



WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/



WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-01 Thread eje
Those attacks been going on for years now. I create on our core router long 
time back that will detect successive new ssh connections and block the source 
ip for 30minutes. Works very well. 

/Eje
Sent via BlackBerry from T-Mobile

-Original Message-
From: "Tom Sharples" 

Date: Fri, 1 May 2009 18:22:22 
To: WISPA General List
Subject: [WISPA] Crude dictionary attack via ssh


Spotted this a few minutes ago on one of our back-end servers. Didn't work, but 
worth noting.

Tom S.

May  2 01:05:12 QORVUS1 sshd[21728]: Illegal user lieu from 213.165.154.53
May  2 01:05:13 QORVUS1 sshd[21730]: Illegal user lilly from 213.165.154.53
May  2 01:05:15 QORVUS1 sshd[21739]: Illegal user linda from 213.165.154.53
May  2 01:05:17 QORVUS1 sshd[21751]: Illegal user ling from 213.165.154.53
May  2 01:05:18 QORVUS1 sshd[21754]: Illegal user lionel from 213.165.154.53
May  2 01:05:20 QORVUS1 sshd[21761]: Illegal user lis from 213.165.154.53
May  2 01:05:22 QORVUS1 sshd[21763]: Illegal user lisa from 213.165.154.53
May  2 01:05:22 QORVUS1 kernel: multicast
May  2 01:05:23 QORVUS1 sshd[21765]: Illegal user liv from 213.165.154.53
May  2 01:05:25 QORVUS1 sshd[21768]: Illegal user liz from 213.165.154.53
May  2 01:05:26 QORVUS1 sshd[21806]: Illegal user liza from 213.165.154.53
May  2 01:05:28 QORVUS1 sshd[21808]: Illegal user loan from 213.165.154.53
May  2 01:05:30 QORVUS1 sshd[21810]: Illegal user logan from 213.165.154.53
May  2 01:05:31 QORVUS1 sshd[21812]: Illegal user lois from 213.165.154.53
May  2 01:05:33 QORVUS1 sshd[21814]: Illegal user lok from 213.165.154.53
May  2 01:05:35 QORVUS1 sshd[21817]: Illegal user loki from 213.165.154.53
May  2 01:05:37 QORVUS1 sshd[21819]: Illegal user lola from 213.165.154.53
May  2 01:05:38 QORVUS1 sshd[21821]: Illegal user long from 213.165.154.53
May  2 01:05:40 QORVUS1 sshd[21823]: Illegal user lorena from 213.165.154.53
May  2 01:05:42 QORVUS1 sshd[21825]: Illegal user lorene from 213.165.154.53
May  2 01:05:43 QORVUS1 sshd[21827]: Illegal user lorenzo from 213.165.154.53
May  2 01:05:45 QORVUS1 sshd[21830]: Illegal user lorna from 213.165.154.53
May  2 01:05:46 QORVUS1 sshd[21868]: Illegal user lotus from 213.165.154.53
May  2 01:05:48 QORVUS1 sshd[21870]: Illegal user lou from 213.165.154.53
May  2 01:05:50 QORVUS1 sshd[21881]: Illegal user louis from 213.165.154.53
May  2 01:05:51 QORVUS1 sshd[21888]: Illegal user luca from 213.165.154.53
May  2 01:05:53 QORVUS1 sshd[21891]: Illegal user lucas from 213.165.154.53
May  2 01:05:55 QORVUS1 sshd[21906]: Illegal user lucian from 213.165.154.53
May  2 01:05:56 QORVUS1 sshd[21912]: Illegal user lucky from 213.165.154.53
May  2 01:05:58 QORVUS1 sshd[21917]: Illegal user lucy from 213.165.154.53
May  2 01:05:59 QORVUS1 sshd[21921]: Illegal user ludwig from 213.165.154.53
May  2 01:06:01 QORVUS1 sshd[21923]: Illegal user luigi from 213.165.154.53
May  2 01:06:03 QORVUS1 sshd[22065]: Illegal user luis from 213.165.154.53
May  2 01:06:04 QORVUS1 sshd[22069]: Illegal user luke from 213.165.154.53
May  2 01:06:06 QORVUS1 sshd[22089]: Illegal user luna from 213.165.154.53
May  2 01:06:07 QORVUS1 sshd[22110]: Illegal user lupe from 213.165.154.53
May  2 01:06:09 QORVUS1 sshd[22112]: Illegal user luther from 213.165.154.53
May  2 01:06:11 QORVUS1 sshd[22114]: Illegal user luz from 213.165.154.53
May  2 01:06:12 QORVUS1 sshd[22116]: Illegal user ly from 213.165.154.53
May  2 01:06:14 QORVUS1 sshd[22118]: Illegal user lyn from 213.165.154.53
May  2 01:06:15 QORVUS1 sshd[22121]: Illegal user lynda from 213.165.154.53
May  2 01:06:17 QORVUS1 sshd[22123]: Illegal user lynn from 213.165.154.53
May  2 01:06:19 QORVUS1 sshd[22125]: Illegal user lysa from 213.165.154.53
May  2 01:06:20 QORVUS1 sshd[22127]: Illegal user mac from 213.165.154.53
May  2 01:06:22 QORVUS1 kernel: multicast
May  2 01:06:22 QORVUS1 sshd[22129]: Illegal user macy from 213.165.154.53
May  2 01:06:24 QORVUS1 sshd[22131]: Illegal user mae from 213.165.154.53
May  2 01:06:25 QORVUS1 sshd[22134]: Illegal user pwla from 213.165.154.53
May  2 01:06:27 QORVUS1 sshd[22172]: Illegal user mama from 213.165.154.53
May  2 01:06:28 QORVUS1 sshd[22181]: Illegal user maeko from 213.165.154.53
May  2 01:06:30 QORVUS1 sshd[22190]: Illegal user magda from 213.165.154.53
May  2 01:06:32 QORVUS1 sshd[22192]: Illegal user maggie from 213.165.154.53
May  2 01:06:33 QORVUS1 sshd[22204]: Illegal user mai from 213.165.154.53
May  2 01:06:35 QORVUS1 sshd[22214]: Illegal user maia from 213.165.154.53
May  2 01:06:36 QORVUS1 sshd[0]: Illegal user makoto from 213.165.154.53
May  2 01:06:38 QORVUS1 sshd[3]: Illegal user mallory from 213.165.154.53
May  2 01:06:40 QORVUS1 sshd[5]: Illegal user mandy from 213.165.154.53
May  2 01:06:41 QORVUS1 sshd[7]: Illegal user marc from 213.165.154.53
May  2 01:06:43 QORVUS1 sshd[9]: Illegal user marcel from 213.165.154.53
May  2 01:06:44 QORVUS1 sshd[22232]: Illegal user marco from 213.165.154.53
May  2 01:06:46 QORVUS1 sshd[

Re: [WISPA] Crude dictionary attack via ssh

2009-05-01 Thread Tom Sharples
This works too :-)

iptables -A INPUT -s 213.165.154.53/24 -j DROP

Tom S.

- Original Message - 
From: "Josh Luthman" 
To: "Tom Sharples" ; "WISPA General List" 

Sent: Friday, May 01, 2009 6:25 PM
Subject: Re: [WISPA] Crude dictionary attack via ssh


> Install DenyHosts and those go away.
>
> On 5/1/09, Tom Sharples  wrote:
>> Spotted this a few minutes ago on one of our back-end servers. Didn't 
>> work,
>> but worth noting.
>>
>> Tom S.
>>
>> May  2 01:05:12 QORVUS1 sshd[21728]: Illegal user lieu from 
>> 213.165.154.53
>> May  2 01:05:13 QORVUS1 sshd[21730]: Illegal user lilly from 
>> 213.165.154.53
>> May  2 01:05:15 QORVUS1 sshd[21739]: Illegal user linda from 
>> 213.165.154.53
>> May  2 01:05:17 QORVUS1 sshd[21751]: Illegal user ling from 
>> 213.165.154.53
>> May  2 01:05:18 QORVUS1 sshd[21754]: Illegal user lionel from 
>> 213.165.154.53
>> May  2 01:05:20 QORVUS1 sshd[21761]: Illegal user lis from 213.165.154.53
>> May  2 01:05:22 QORVUS1 sshd[21763]: Illegal user lisa from 
>> 213.165.154.53
>> May  2 01:05:22 QORVUS1 kernel: multicast
>> May  2 01:05:23 QORVUS1 sshd[21765]: Illegal user liv from 213.165.154.53
>> May  2 01:05:25 QORVUS1 sshd[21768]: Illegal user liz from 213.165.154.53
>> May  2 01:05:26 QORVUS1 sshd[21806]: Illegal user liza from 
>> 213.165.154.53
>> May  2 01:05:28 QORVUS1 sshd[21808]: Illegal user loan from 
>> 213.165.154.53
>> May  2 01:05:30 QORVUS1 sshd[21810]: Illegal user logan from 
>> 213.165.154.53
>> May  2 01:05:31 QORVUS1 sshd[21812]: Illegal user lois from 
>> 213.165.154.53
>> May  2 01:05:33 QORVUS1 sshd[21814]: Illegal user lok from 213.165.154.53
>> May  2 01:05:35 QORVUS1 sshd[21817]: Illegal user loki from 
>> 213.165.154.53
>> May  2 01:05:37 QORVUS1 sshd[21819]: Illegal user lola from 
>> 213.165.154.53
>> May  2 01:05:38 QORVUS1 sshd[21821]: Illegal user long from 
>> 213.165.154.53
>> May  2 01:05:40 QORVUS1 sshd[21823]: Illegal user lorena from 
>> 213.165.154.53
>> May  2 01:05:42 QORVUS1 sshd[21825]: Illegal user lorene from 
>> 213.165.154.53
>> May  2 01:05:43 QORVUS1 sshd[21827]: Illegal user lorenzo from
>> 213.165.154.53
>> May  2 01:05:45 QORVUS1 sshd[21830]: Illegal user lorna from 
>> 213.165.154.53
>> May  2 01:05:46 QORVUS1 sshd[21868]: Illegal user lotus from 
>> 213.165.154.53
>> May  2 01:05:48 QORVUS1 sshd[21870]: Illegal user lou from 213.165.154.53
>> May  2 01:05:50 QORVUS1 sshd[21881]: Illegal user louis from 
>> 213.165.154.53
>> May  2 01:05:51 QORVUS1 sshd[21888]: Illegal user luca from 
>> 213.165.154.53
>> May  2 01:05:53 QORVUS1 sshd[21891]: Illegal user lucas from 
>> 213.165.154.53
>> May  2 01:05:55 QORVUS1 sshd[21906]: Illegal user lucian from 
>> 213.165.154.53
>> May  2 01:05:56 QORVUS1 sshd[21912]: Illegal user lucky from 
>> 213.165.154.53
>> May  2 01:05:58 QORVUS1 sshd[21917]: Illegal user lucy from 
>> 213.165.154.53
>> May  2 01:05:59 QORVUS1 sshd[21921]: Illegal user ludwig from 
>> 213.165.154.53
>> May  2 01:06:01 QORVUS1 sshd[21923]: Illegal user luigi from 
>> 213.165.154.53
>> May  2 01:06:03 QORVUS1 sshd[22065]: Illegal user luis from 
>> 213.165.154.53
>> May  2 01:06:04 QORVUS1 sshd[22069]: Illegal user luke from 
>> 213.165.154.53
>> May  2 01:06:06 QORVUS1 sshd[22089]: Illegal user luna from 
>> 213.165.154.53
>> May  2 01:06:07 QORVUS1 sshd[22110]: Illegal user lupe from 
>> 213.165.154.53
>> May  2 01:06:09 QORVUS1 sshd[22112]: Illegal user luther from 
>> 213.165.154.53
>> May  2 01:06:11 QORVUS1 sshd[22114]: Illegal user luz from 213.165.154.53
>> May  2 01:06:12 QORVUS1 sshd[22116]: Illegal user ly from 213.165.154.53
>> May  2 01:06:14 QORVUS1 sshd[22118]: Illegal user lyn from 213.165.154.53
>> May  2 01:06:15 QORVUS1 sshd[22121]: Illegal user lynda from 
>> 213.165.154.53
>> May  2 01:06:17 QORVUS1 sshd[22123]: Illegal user lynn from 
>> 213.165.154.53
>> May  2 01:06:19 QORVUS1 sshd[22125]: Illegal user lysa from 
>> 213.165.154.53
>> May  2 01:06:20 QORVUS1 sshd[22127]: Illegal user mac from 213.165.154.53
>> May  2 01:06:22 QORVUS1 kernel: multicast
>> May  2 01:06:22 QORVUS1 sshd[22129]: Illegal user macy from 
>> 213.165.154.53
>> May  2 01:06:24 QORVUS1 sshd[22131]: Illegal user mae from 213.165.154.53
>> May  2 01:06:25 QORVUS1 sshd[22134]: Illegal user pwla from 
>> 213.165.154.53
>> May  2 01:06:27 QORVUS1 sshd[22172]: Illegal user mama from 
>> 213.165.154.53
>> May  2 01:06:28 QOR

Re: [WISPA] Crude dictionary attack via ssh

2009-05-01 Thread Rogelio
Josh Luthman wrote:
> Install DenyHosts and those go away.

ditto

http://denyhosts.sourceforge.net/
http://denyhosts.sourceforge.net/faq.html
http://www.howtoforge.com/preventing_ssh_dictionary_attacks_with_denyhosts

"DenyHosts is a script intended to be run by Linux system administrators 
to help thwart SSH server attacks (also known as dictionary based 
attacks and brute force attacks).

If you've ever looked at your ssh log (/var/log/secure on Redhat, 
/var/log/auth.log on Mandrake, etc...) you may be alarmed to see how 
many hackers attempted to gain access to your server. Hopefully, none of 
them were successful (but then again, how would you know?). Wouldn't it 
be better to automatically prevent that attacker from continuing to gain 
entry into your system?"



WISPA Wants You! Join today!
http://signup.wispa.org/

 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Crude dictionary attack via ssh

2009-05-01 Thread Josh Luthman
Install DenyHosts and those go away.

On 5/1/09, Tom Sharples  wrote:
> Spotted this a few minutes ago on one of our back-end servers. Didn't work,
> but worth noting.
>
> Tom S.
>
> May  2 01:05:12 QORVUS1 sshd[21728]: Illegal user lieu from 213.165.154.53
> May  2 01:05:13 QORVUS1 sshd[21730]: Illegal user lilly from 213.165.154.53
> May  2 01:05:15 QORVUS1 sshd[21739]: Illegal user linda from 213.165.154.53
> May  2 01:05:17 QORVUS1 sshd[21751]: Illegal user ling from 213.165.154.53
> May  2 01:05:18 QORVUS1 sshd[21754]: Illegal user lionel from 213.165.154.53
> May  2 01:05:20 QORVUS1 sshd[21761]: Illegal user lis from 213.165.154.53
> May  2 01:05:22 QORVUS1 sshd[21763]: Illegal user lisa from 213.165.154.53
> May  2 01:05:22 QORVUS1 kernel: multicast
> May  2 01:05:23 QORVUS1 sshd[21765]: Illegal user liv from 213.165.154.53
> May  2 01:05:25 QORVUS1 sshd[21768]: Illegal user liz from 213.165.154.53
> May  2 01:05:26 QORVUS1 sshd[21806]: Illegal user liza from 213.165.154.53
> May  2 01:05:28 QORVUS1 sshd[21808]: Illegal user loan from 213.165.154.53
> May  2 01:05:30 QORVUS1 sshd[21810]: Illegal user logan from 213.165.154.53
> May  2 01:05:31 QORVUS1 sshd[21812]: Illegal user lois from 213.165.154.53
> May  2 01:05:33 QORVUS1 sshd[21814]: Illegal user lok from 213.165.154.53
> May  2 01:05:35 QORVUS1 sshd[21817]: Illegal user loki from 213.165.154.53
> May  2 01:05:37 QORVUS1 sshd[21819]: Illegal user lola from 213.165.154.53
> May  2 01:05:38 QORVUS1 sshd[21821]: Illegal user long from 213.165.154.53
> May  2 01:05:40 QORVUS1 sshd[21823]: Illegal user lorena from 213.165.154.53
> May  2 01:05:42 QORVUS1 sshd[21825]: Illegal user lorene from 213.165.154.53
> May  2 01:05:43 QORVUS1 sshd[21827]: Illegal user lorenzo from
> 213.165.154.53
> May  2 01:05:45 QORVUS1 sshd[21830]: Illegal user lorna from 213.165.154.53
> May  2 01:05:46 QORVUS1 sshd[21868]: Illegal user lotus from 213.165.154.53
> May  2 01:05:48 QORVUS1 sshd[21870]: Illegal user lou from 213.165.154.53
> May  2 01:05:50 QORVUS1 sshd[21881]: Illegal user louis from 213.165.154.53
> May  2 01:05:51 QORVUS1 sshd[21888]: Illegal user luca from 213.165.154.53
> May  2 01:05:53 QORVUS1 sshd[21891]: Illegal user lucas from 213.165.154.53
> May  2 01:05:55 QORVUS1 sshd[21906]: Illegal user lucian from 213.165.154.53
> May  2 01:05:56 QORVUS1 sshd[21912]: Illegal user lucky from 213.165.154.53
> May  2 01:05:58 QORVUS1 sshd[21917]: Illegal user lucy from 213.165.154.53
> May  2 01:05:59 QORVUS1 sshd[21921]: Illegal user ludwig from 213.165.154.53
> May  2 01:06:01 QORVUS1 sshd[21923]: Illegal user luigi from 213.165.154.53
> May  2 01:06:03 QORVUS1 sshd[22065]: Illegal user luis from 213.165.154.53
> May  2 01:06:04 QORVUS1 sshd[22069]: Illegal user luke from 213.165.154.53
> May  2 01:06:06 QORVUS1 sshd[22089]: Illegal user luna from 213.165.154.53
> May  2 01:06:07 QORVUS1 sshd[22110]: Illegal user lupe from 213.165.154.53
> May  2 01:06:09 QORVUS1 sshd[22112]: Illegal user luther from 213.165.154.53
> May  2 01:06:11 QORVUS1 sshd[22114]: Illegal user luz from 213.165.154.53
> May  2 01:06:12 QORVUS1 sshd[22116]: Illegal user ly from 213.165.154.53
> May  2 01:06:14 QORVUS1 sshd[22118]: Illegal user lyn from 213.165.154.53
> May  2 01:06:15 QORVUS1 sshd[22121]: Illegal user lynda from 213.165.154.53
> May  2 01:06:17 QORVUS1 sshd[22123]: Illegal user lynn from 213.165.154.53
> May  2 01:06:19 QORVUS1 sshd[22125]: Illegal user lysa from 213.165.154.53
> May  2 01:06:20 QORVUS1 sshd[22127]: Illegal user mac from 213.165.154.53
> May  2 01:06:22 QORVUS1 kernel: multicast
> May  2 01:06:22 QORVUS1 sshd[22129]: Illegal user macy from 213.165.154.53
> May  2 01:06:24 QORVUS1 sshd[22131]: Illegal user mae from 213.165.154.53
> May  2 01:06:25 QORVUS1 sshd[22134]: Illegal user pwla from 213.165.154.53
> May  2 01:06:27 QORVUS1 sshd[22172]: Illegal user mama from 213.165.154.53
> May  2 01:06:28 QORVUS1 sshd[22181]: Illegal user maeko from 213.165.154.53
> May  2 01:06:30 QORVUS1 sshd[22190]: Illegal user magda from 213.165.154.53
> May  2 01:06:32 QORVUS1 sshd[22192]: Illegal user maggie from 213.165.154.53
> May  2 01:06:33 QORVUS1 sshd[22204]: Illegal user mai from 213.165.154.53
> May  2 01:06:35 QORVUS1 sshd[22214]: Illegal user maia from 213.165.154.53
> May  2 01:06:36 QORVUS1 sshd[0]: Illegal user makoto from 213.165.154.53
> May  2 01:06:38 QORVUS1 sshd[3]: Illegal user mallory from
> 213.165.154.53
> May  2 01:06:40 QORVUS1 sshd[5]: Illegal user mandy from 213.165.154.53
> May  2 01:06:41 QORVUS1 sshd[7]: Illegal user marc from 213.165.154.53
> May  2 01:06:43 QORVUS1 sshd[9]: Illegal user marcel from 213.165.154.53
> May  2 01:06:44 QORVUS1 sshd[22232]: Illegal user marco from 213.165.154.53
> May  2 01:06:46 QORVUS1 sshd[22235]: Illegal user marcus from 213.165.154.53
> May  2 01:06:48 QORVUS1 sshd[22272]: Illegal user margot from 213.165.154.53
> May  2 01:06:49 QORVUS1 sshd[22274]: Illegal user mari from 213.165.154.53

[WISPA] Crude dictionary attack via ssh

2009-05-01 Thread Tom Sharples
Spotted this a few minutes ago on one of our back-end servers. Didn't work, but 
worth noting.

Tom S.

May  2 01:05:12 QORVUS1 sshd[21728]: Illegal user lieu from 213.165.154.53
May  2 01:05:13 QORVUS1 sshd[21730]: Illegal user lilly from 213.165.154.53
May  2 01:05:15 QORVUS1 sshd[21739]: Illegal user linda from 213.165.154.53
May  2 01:05:17 QORVUS1 sshd[21751]: Illegal user ling from 213.165.154.53
May  2 01:05:18 QORVUS1 sshd[21754]: Illegal user lionel from 213.165.154.53
May  2 01:05:20 QORVUS1 sshd[21761]: Illegal user lis from 213.165.154.53
May  2 01:05:22 QORVUS1 sshd[21763]: Illegal user lisa from 213.165.154.53
May  2 01:05:22 QORVUS1 kernel: multicast
May  2 01:05:23 QORVUS1 sshd[21765]: Illegal user liv from 213.165.154.53
May  2 01:05:25 QORVUS1 sshd[21768]: Illegal user liz from 213.165.154.53
May  2 01:05:26 QORVUS1 sshd[21806]: Illegal user liza from 213.165.154.53
May  2 01:05:28 QORVUS1 sshd[21808]: Illegal user loan from 213.165.154.53
May  2 01:05:30 QORVUS1 sshd[21810]: Illegal user logan from 213.165.154.53
May  2 01:05:31 QORVUS1 sshd[21812]: Illegal user lois from 213.165.154.53
May  2 01:05:33 QORVUS1 sshd[21814]: Illegal user lok from 213.165.154.53
May  2 01:05:35 QORVUS1 sshd[21817]: Illegal user loki from 213.165.154.53
May  2 01:05:37 QORVUS1 sshd[21819]: Illegal user lola from 213.165.154.53
May  2 01:05:38 QORVUS1 sshd[21821]: Illegal user long from 213.165.154.53
May  2 01:05:40 QORVUS1 sshd[21823]: Illegal user lorena from 213.165.154.53
May  2 01:05:42 QORVUS1 sshd[21825]: Illegal user lorene from 213.165.154.53
May  2 01:05:43 QORVUS1 sshd[21827]: Illegal user lorenzo from 213.165.154.53
May  2 01:05:45 QORVUS1 sshd[21830]: Illegal user lorna from 213.165.154.53
May  2 01:05:46 QORVUS1 sshd[21868]: Illegal user lotus from 213.165.154.53
May  2 01:05:48 QORVUS1 sshd[21870]: Illegal user lou from 213.165.154.53
May  2 01:05:50 QORVUS1 sshd[21881]: Illegal user louis from 213.165.154.53
May  2 01:05:51 QORVUS1 sshd[21888]: Illegal user luca from 213.165.154.53
May  2 01:05:53 QORVUS1 sshd[21891]: Illegal user lucas from 213.165.154.53
May  2 01:05:55 QORVUS1 sshd[21906]: Illegal user lucian from 213.165.154.53
May  2 01:05:56 QORVUS1 sshd[21912]: Illegal user lucky from 213.165.154.53
May  2 01:05:58 QORVUS1 sshd[21917]: Illegal user lucy from 213.165.154.53
May  2 01:05:59 QORVUS1 sshd[21921]: Illegal user ludwig from 213.165.154.53
May  2 01:06:01 QORVUS1 sshd[21923]: Illegal user luigi from 213.165.154.53
May  2 01:06:03 QORVUS1 sshd[22065]: Illegal user luis from 213.165.154.53
May  2 01:06:04 QORVUS1 sshd[22069]: Illegal user luke from 213.165.154.53
May  2 01:06:06 QORVUS1 sshd[22089]: Illegal user luna from 213.165.154.53
May  2 01:06:07 QORVUS1 sshd[22110]: Illegal user lupe from 213.165.154.53
May  2 01:06:09 QORVUS1 sshd[22112]: Illegal user luther from 213.165.154.53
May  2 01:06:11 QORVUS1 sshd[22114]: Illegal user luz from 213.165.154.53
May  2 01:06:12 QORVUS1 sshd[22116]: Illegal user ly from 213.165.154.53
May  2 01:06:14 QORVUS1 sshd[22118]: Illegal user lyn from 213.165.154.53
May  2 01:06:15 QORVUS1 sshd[22121]: Illegal user lynda from 213.165.154.53
May  2 01:06:17 QORVUS1 sshd[22123]: Illegal user lynn from 213.165.154.53
May  2 01:06:19 QORVUS1 sshd[22125]: Illegal user lysa from 213.165.154.53
May  2 01:06:20 QORVUS1 sshd[22127]: Illegal user mac from 213.165.154.53
May  2 01:06:22 QORVUS1 kernel: multicast
May  2 01:06:22 QORVUS1 sshd[22129]: Illegal user macy from 213.165.154.53
May  2 01:06:24 QORVUS1 sshd[22131]: Illegal user mae from 213.165.154.53
May  2 01:06:25 QORVUS1 sshd[22134]: Illegal user pwla from 213.165.154.53
May  2 01:06:27 QORVUS1 sshd[22172]: Illegal user mama from 213.165.154.53
May  2 01:06:28 QORVUS1 sshd[22181]: Illegal user maeko from 213.165.154.53
May  2 01:06:30 QORVUS1 sshd[22190]: Illegal user magda from 213.165.154.53
May  2 01:06:32 QORVUS1 sshd[22192]: Illegal user maggie from 213.165.154.53
May  2 01:06:33 QORVUS1 sshd[22204]: Illegal user mai from 213.165.154.53
May  2 01:06:35 QORVUS1 sshd[22214]: Illegal user maia from 213.165.154.53
May  2 01:06:36 QORVUS1 sshd[0]: Illegal user makoto from 213.165.154.53
May  2 01:06:38 QORVUS1 sshd[3]: Illegal user mallory from 213.165.154.53
May  2 01:06:40 QORVUS1 sshd[5]: Illegal user mandy from 213.165.154.53
May  2 01:06:41 QORVUS1 sshd[7]: Illegal user marc from 213.165.154.53
May  2 01:06:43 QORVUS1 sshd[9]: Illegal user marcel from 213.165.154.53
May  2 01:06:44 QORVUS1 sshd[22232]: Illegal user marco from 213.165.154.53
May  2 01:06:46 QORVUS1 sshd[22235]: Illegal user marcus from 213.165.154.53
May  2 01:06:48 QORVUS1 sshd[22272]: Illegal user margot from 213.165.154.53
May  2 01:06:49 QORVUS1 sshd[22274]: Illegal user mari from 213.165.154.53
May  2 01:06:51 QORVUS1 sshd[22276]: Illegal user maria from 213.165.154.53
May  2 01:06:53 QORVUS1 sshd[22278]: Illegal user mariah from 213.165.154.53
May  2 01:06:54 QORVUS1 sshd[22280]: Illegal user mar