Re: Idea to secure ssh

2006-03-15 Thread Goswin von Brederlow
Michel Messerschmidt [EMAIL PROTECTED] writes: Neal Murphy said: The point is to obscure the ssh server from everyone, including those who are authorized to access it remotely. You're right, this is just the old idea of security by obscurity. And quite pointless. Better install a fake sshd

Re: Idea to secure ssh

2006-03-15 Thread Goswin von Brederlow
Michael Stone [EMAIL PROTECTED] writes: On Mon, Mar 13, 2006 at 03:03:24PM -0500, Neal Murphy wrote: Yes, allowing UDP packets in is, in a sense, an open port, but it's a one-way port. UDP packets have a fixed maximum size and the information carried in the packet is trivial in nature; UDP

Re: Idea to secure ssh

2006-03-15 Thread Michael Stone
On Wed, Mar 15, 2006 at 02:35:53PM +0100, Goswin von Brederlow wrote: Michael Stone [EMAIL PROTECTED] writes: No, anyone can generate encrypted parts. IMHO, there's not much chance that the decryption routines in your magic udp parser are going to be less vulnerable than those in openssh

Re: Idea to secure ssh

2006-03-15 Thread Goswin von Brederlow
Michael Stone [EMAIL PROTECTED] writes: On Wed, Mar 15, 2006 at 02:35:53PM +0100, Goswin von Brederlow wrote: Michael Stone [EMAIL PROTECTED] writes: No, anyone can generate encrypted parts. IMHO, there's not much chance that the decryption routines in your magic udp parser are going to be

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-15 Thread Thomas Seliger
Neal Murphy wrote: The point is to reduce brute-forace attacks to the point of nearly total ineffectiveness. I use OpenSSH public/private key authentication to achieve this. Based on needs one could also use two factor authentication (e.g. one time password tokens) or even a combination of

Re: Idea to secure ssh

2006-03-15 Thread Michael Stone
On Wed, Mar 15, 2006 at 05:06:34PM +0100, Goswin von Brederlow wrote: His idea is to add a 100% non responsive knocking (using udp) before the actual ssh handshake so unauthorized clients can't even determine that sshd is running. Not that I find that usefull but thats the idea. Traditional

Re: Idea to secure ssh

2006-03-15 Thread Neal Murphy
On Wednesday 15 March 2006 11:06, Goswin von Brederlow wrote: He trying to solve that a tcp connect to port 22 establishes a connection and thereby reveals that the server is running an sshd and attcking it makes sense. His idea is to add a 100% non responsive knocking (using udp) before the

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-14 Thread Michel Messerschmidt
Neal Murphy said: The point is to obscure the ssh server from everyone, including those who are authorized to access it remotely. You're right, this is just the old idea of security by obscurity. The point is to reduce brute-forace attacks to the point of nearly total ineffectiveness. The

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-14 Thread Michael Stone
On Mon, Mar 13, 2006 at 11:06:38PM -0500, Neal Murphy wrote: The point is to obscure the ssh server from everyone, including those who are authorized to access it remotely. The point is to reduce brute-forace attacks to the point of nearly total ineffectiveness. No more so than simply

Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Neal Murphy
On Monday 13 March 2006 01:24, fgeek wrote: Hello, once in a while (say, every two weeks) I get a brute-force login/password scan attempt in my server (i.e., a single ip tries dictionary account names and passwords at random). SSH access is needed by many users, and (RSA/DSA key)-only

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Joerg Rieger
On Mon, Mar 13, 2006 at 03:19:30AM -0500, Neal Murphy wrote: [...] My idea is akin to a monastery that has no visible way in or out. If someone wants in, he has to know where to knock, using the Super Secret Squirrel coded knock. Then he has to wait a bit before he tries to pass his

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Nicolas Rachinsky
* Neal Murphy [EMAIL PROTECTED] [2006-03-13 03:19 -0500]: Consider: [...] Sounds like putting http://ingles.homeunix.org/software/ost/ into ssh(d). Nicolas -- http://www.rachinsky.de/nicolas -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread johannes weiß
Hi Guys, [...] I use fail2ban and I'm very happy with it. Just my 2 cents, regards, johannes -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread dsr
On Mon, Mar 13, 2006 at 03:19:30AM -0500, Neal Murphy wrote: It seems kind-of counterproductive to set up SSH for secure access, then advertise to the universe that it's there. Thus my idea: Consider: - sshd listens on a pre-shared UDP port for 'a knock on the door', specifically a

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Neal Murphy
On Monday 13 March 2006 09:38, [EMAIL PROTECTED] wrote: On Mon, Mar 13, 2006 at 03:19:30AM -0500, Neal Murphy wrote: It seems kind-of counterproductive to set up SSH for secure access, then advertise to the universe that it's there. Thus my idea: Consider: - sshd listens on a

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Michael Stone
On Mon, Mar 13, 2006 at 03:03:24PM -0500, Neal Murphy wrote: The idea is to present information to the server that only the server can decrypt, and that, in theory, only the authorized user could have generated. Much like an authentication system. What's the point of all this over just

Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-13 Thread Neal Murphy
On Monday 13 March 2006 20:07, Michael Stone wrote: On Mon, Mar 13, 2006 at 03:03:24PM -0500, Neal Murphy wrote: The idea is to present information to the server that only the server can decrypt, and that, in theory, only the authorized user could have generated. Much like an authentication