Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-02-04 Thread Bill Campbell
On Mon, Feb 04, 2008, John Horne wrote: > >On Wed, 2008-01-30 at 13:11 -0800, Bill Campbell wrote: >> On Wed, Jan 30, 2008, Brian Mathis wrote: >> ... >> > >> >Log parsing scripts often don't provide the immediacy that rate >> >limiting does when under attack. You'd have to run the script >> >cons

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-02-04 Thread John Horne
On Wed, 2008-01-30 at 13:11 -0800, Bill Campbell wrote: > On Wed, Jan 30, 2008, Brian Mathis wrote: > ... > > > >Log parsing scripts often don't provide the immediacy that rate > >limiting does when under attack. You'd have to run the script > >constantly parsing logs, since most ssh scans come i

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-02-04 Thread Milton Calnek
mouss wrote: Les Bell wrote: mouss <[EMAIL PROTECTED]> wrote: If you consider this security through obscurity, then why not publish the list of your users on a public web page? after all, you should use strong passwords, so why hide usernames? << Usernames are comparatively hard to guess,

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-02-02 Thread mouss
Jay Leafey wrote: What I would I like to do is: - allow 22 from specific IPs - allow another port (redirected) from anywhere. this port is then redirected to 22. I do exactly this with a combination of SSH config options and iptables rules. In your /etc/ssh/sshd_config file, find the "Po

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-02-01 Thread mouss
Les Bell wrote: mouss <[EMAIL PROTECTED]> wrote: If you consider this security through obscurity, then why not publish the list of your users on a public web page? after all, you should use strong passwords, so why hide usernames? << Usernames are comparatively hard to guess, and chosen fro

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-01-31 Thread Warren Young
James B. Byrne wrote: I am not a fan of security through obscurity. You're diluting a useful phrase. It originally referred to practices where obscurity was the _only_ source of security. As soon as you saw through the obscurity, there was no security. Of course, this means that there w

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-01-30 Thread David Mackintosh
On Wed, Jan 30, 2008 at 12:17:22PM -0500, Ed Donahue wrote: > I use this one, works great and easy to setup > http://rfxnetworks.com/bfd.php This is how I deal with them: deny by default unless you know the "secret handshake". http://wiki.xdroop.com/space/Linux/Limited+SSH+Access -- /\oo/\ /

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-01-30 Thread Jay Leafey
What I would I like to do is: - allow 22 from specific IPs - allow another port (redirected) from anywhere. this port is then redirected to 22. I do exactly this with a combination of SSH config options and iptables rules. In your /etc/ssh/sshd_config file, find the "Port 22" statement a

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-01-30 Thread Les Bell
mouss <[EMAIL PROTECTED]> wrote: >> If you consider this security through obscurity, then why not publish the list of your users on a public web page? after all, you should use strong passwords, so why hide usernames? << Usernames are comparatively hard to guess, and chosen from a large space -

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-01-30 Thread mouss
James B. Byrne wrote: Message-ID: <[EMAIL PROTECTED]> On: Tue, 29 Jan 2008 07:30:11 -0600, Johnny Hughes <[EMAIL PROTECTED]> Subject Was: [CentOS] Unknown rootkit causes compromised servers SOME of the script kiddies check higher ports for SSH *_BUT_* I only see 4% of the brute force attemp

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-01-30 Thread Bill Campbell
On Wed, Jan 30, 2008, Brian Mathis wrote: ... > >Log parsing scripts often don't provide the immediacy that rate >limiting does when under attack. You'd have to run the script >constantly parsing logs, since most ssh scans come in bursts. We use swatch for this and othter interesting events (e.g.

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-01-30 Thread Milton Calnek
Good security is like an onion. The users' think it smells... No, it's layered. Changing the the sshd port from the default does add a layer, a thin layer, but a layer all the same. The rate limiting is a somewhat thicker layer. I personally prefer to block all ssh traffic from the internet

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-01-30 Thread Patrick
Brian Mathis wrote: @James: As for the "security through obscurity" post, you are missing the point. Changing the port number that SSH runs on is not "security through obscurity". Moving an already highly secure service to a different port so scanners don't hit it automatically is a different

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-01-30 Thread Brian Mathis
On Wed, Jan 30, 2008 at 12:17 PM, Ed Donahue <[EMAIL PROTECTED]> wrote: > On Jan 30, 2008 11:54 AM, James B. Byrne <[EMAIL PROTECTED]> wrote: > > Message-ID: <[EMAIL PROTECTED]> > > > > On: Tue, 29 Jan 2008 07:30:11 -0600, Johnny Hughes <[EMAIL PROTECTED]> > > Subject Was: [CentOS] Unknown rootkit

Re: [CentOS] One approach to dealing with SSH brute force attacks.

2008-01-30 Thread Ed Donahue
I use this one, works great and easy to setup http://rfxnetworks.com/bfd.php On Jan 30, 2008 11:54 AM, James B. Byrne <[EMAIL PROTECTED]> wrote: > Message-ID: <[EMAIL PROTECTED]> > > On: Tue, 29 Jan 2008 07:30:11 -0600, Johnny Hughes <[EMAIL PROTECTED]> > Subject Was: [CentOS] Unknown rootkit ca

[CentOS] One approach to dealing with SSH brute force attacks.

2008-01-30 Thread James B. Byrne
Message-ID: <[EMAIL PROTECTED]> On: Tue, 29 Jan 2008 07:30:11 -0600, Johnny Hughes <[EMAIL PROTECTED]> Subject Was: [CentOS] Unknown rootkit causes compromised servers > > SOME of the script kiddies check higher ports for SSH *_BUT_* I only see > 4% of the brute force attempts to login on ports o