Re: Thousands of ssh probes

2010-03-08 Thread Jason Garrett
On Mon, Mar 8, 2010 at 16:11, Erik Norgaard wrote: > On 08/03/10 18:56, Jason Garrett wrote: > > Much better, restrict the client access to certain ranges of IPs. The >>> different registries publish ip ranges assigned per country and you can >>> create a list blocking countries you are certain

Re: Thousands of ssh probes

2010-03-08 Thread Erik Norgaard
On 08/03/10 18:56, Jason Garrett wrote: Much better, restrict the client access to certain ranges of IPs. The different registries publish ip ranges assigned per country and you can create a list blocking countries you are certain not to visit, you can use my script: http://www.locolomo.org/

Re: Thousands of ssh probes

2010-03-08 Thread Jason Garrett
On Sun, Mar 7, 2010 at 16:48, Erik Norgaard wrote: > On 07/03/10 21:41, dacoder wrote: > > has anybody suggested having sshd listen on a high port? >> > > Any number will do, think about it: > > a. The attacker doesn't really care which host is compromised any will do, > and better yet someones

Re: Thousands of ssh probes

2010-03-07 Thread Erik Norgaard
On 07/03/10 21:41, dacoder wrote: has anybody suggested having sshd listen on a high port? Any number will do, think about it: a. The attacker doesn't really care which host is compromised any will do, and better yet someones home box as it is more difficult to trace him. In that case he wi

Re: Thousands of ssh probes

2010-03-07 Thread dacoder
+++ Erik Norgaard [06/03/10 02:44 +0100]: On 05/03/10 13:54, John wrote: My nightly security logs have thousands upon thousands of ssh probes in them. One day, over 6500. This is enough that I can actually "feel" it in my network performance. Other than changing ssh to a non-standard port - i

Re: Thousands of ssh probes

2010-03-06 Thread Randal L. Schwartz
> "Matthew" == Matthew Seaman writes: Matthew> On the whole, I don't see the value in having a high-numbered MX to Matthew> dumbly accept, queue and forward messages like this. High-numbered MX came from a time where an internal machine could only be delivered from outside via an external ga

Re: Thousands of ssh probes

2010-03-06 Thread Ian Smith
On Sat, 6 Mar 2010, Matthew Seaman wrote: > On 06/03/2010 06:33:53, Ian Smith wrote: > > In freebsd-questions Digest, Vol 300, Issue 10, Message: 6 > > On Fri, 05 Mar 2010 16:07:29 + Matthew Seaman > > wrote: > > > On 05/03/2010 15:51:52, Randal L. Schwartz wrote: > > > > The spamtrap

Re: Thousands of ssh probes

2010-03-06 Thread Chuck Swiger
On Mar 6, 2010, at 4:36 AM, Matthew Seaman wrote: Having an IPv6-only high-mx seems to terminally confuse most spambots... I understand why IPv6 would confuse them, but don't follow why higher numbered MXs would be more attractive to them in the first place? Are they assuming a 'secondary' MX

Re: Thousands of ssh probes

2010-03-06 Thread Matthew Seaman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/03/2010 06:33:53, Ian Smith wrote: > In freebsd-questions Digest, Vol 300, Issue 10, Message: 6 > On Fri, 05 Mar 2010 16:07:29 + Matthew Seaman > wrote: > > On 05/03/2010 15:51:52, Randal L. Schwartz wrote: > > > The spamtrap is a shiny o

Re: Thousands of ssh probes

2010-03-05 Thread Ian Smith
In freebsd-questions Digest, Vol 300, Issue 10, Message: 6 On Fri, 05 Mar 2010 16:07:29 + Matthew Seaman wrote: > On 05/03/2010 15:51:52, Randal L. Schwartz wrote: > > The spamtrap is a shiny object for spam, and anything that goes there gets > > blocked for an hour from hitting the low po

Re: Thousands of ssh probes

2010-03-05 Thread Randal L. Schwartz
That was just the quick summary. Google for "PPTP security" and you'll see a top link from Bruce Schneier who basically says no way to it. Sent from my iPhone, so blame Steve Jobs for any speeling misteaks. On Mar 5, 2010, at 9:20 PM, Tim Judd wrote: ..wikipedia? that's informative and use

Re: Thousands of ssh probes

2010-03-05 Thread Tim Judd
On 3/5/10, Randal L. Schwartz wrote: >> "Tim" == Tim Judd writes: > > Tim> I've been in that same boat. I eventually came to the decision to: > Tim> Install PPTP server software, accepting connections from any IP. > > Whoa. Here we are, talking about making it *more* secure, and > you go

Re: Thousands of ssh probes

2010-03-05 Thread Tim Daneliuk
On 3/5/2010 7:44 PM, Erik Norgaard wrote: > On 05/03/10 13:54, John wrote: >> My nightly security logs have thousands upon thousands of ssh probes >> in them. One day, over 6500. This is enough that I can actually >> "feel" it in my network performance. Other than changing ssh to >> a non-standa

Re: Thousands of ssh probes

2010-03-05 Thread Erik Norgaard
On 05/03/10 13:54, John wrote: My nightly security logs have thousands upon thousands of ssh probes in them. One day, over 6500. This is enough that I can actually "feel" it in my network performance. Other than changing ssh to a non-standard port - is there a way to deal with these? Every da

Re: Thousands of ssh probes

2010-03-05 Thread Jon Radel
Randal L. Schwartz wrote: "Tim" == Tim Judd writes: Tim> I've been in that same boat. I eventually came to the decision to: Tim> Install PPTP server software, accepting connections from any IP. Whoa. Here we are, talking about making it *more* secure, and you go the other direction

Re: Thousands of ssh probes

2010-03-05 Thread Randal L. Schwartz
> "Tim" == Tim Judd writes: Tim> I've been in that same boat. I eventually came to the decision to: Tim> Install PPTP server software, accepting connections from any IP. Whoa. Here we are, talking about making it *more* secure, and you go the other direction http://en.wikipedia.org

Re: Thousands of ssh probes

2010-03-05 Thread Mike Woods
On 05/03/2010 13:26, John wrote: Ah, I should have added that I travel a fair amount, and often have to get to my systems via hotel WiFi or Aircard, so it's impossible to predict my originating IP address in advance. If that were not the case, this would be an excellent suggestion. What about

Re: Thousands of ssh probes

2010-03-05 Thread Kevin Kinsey
Matthew Seaman wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/03/2010 16:12:11, Randal L. Schwartz wrote: "Matthew" == Matthew Seaman writes: Matthew> On 05/03/2010 15:51:52, Randal L. Schwartz wrote: The spamtrap is a shiny object for spam, and anything that goes there gets bloc

Re: Thousands of ssh probes

2010-03-05 Thread Tim Judd
Replies interspersed On 3/5/10, John wrote: > On Fri, Mar 05, 2010 at 07:03:53AM -0600, Programmer In Training wrote: >> On 03/05/10 06:54, John wrote: >> > My nightly security logs have thousands upon thousands of ssh probes >> > in them. One day, over 6500. This is enough that I can actually

Re: Thousands of ssh probes

2010-03-05 Thread Dino Vliet
Thousands of ssh probes Friday, March 5, 2010 1:54 PM From: "John" To: freebsd-questions@freebsd.org My nightly security logs have thousands upon thousands of ssh probes in them. One day, over 6500. This is enough that I can actually "feel" it in my network performance. Other than changing ss

Re: Thousands of ssh probes

2010-03-05 Thread Matthias Fechner
Hi, Am 05.03.2010 18:10, schrieb John: > I have just switched to pf from ipfw, so I am still learning the > nuances and style points. I switched now to security/sshguard-pf. It works perfectly and blocks also via pf. Blocking is working there with: table persist block in log quick proto tcp fro

Re: Thousands of ssh probes

2010-03-05 Thread John
On Fri, Mar 05, 2010 at 05:04:03PM +, Matthew Seaman wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On 05/03/2010 16:54:50, Matthias Fechner wrote: > > Hi, > > > > Am 05.03.10 17:01, schrieb Matthew Seaman: > >> table persist > >> [...near the top of the rules section...] > >>

Re: Thousands of ssh probes

2010-03-05 Thread Matthew Seaman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/03/2010 16:54:50, Matthias Fechner wrote: > Hi, > > Am 05.03.10 17:01, schrieb Matthew Seaman: >> table persist >> [...near the top of the rules section...] >> block drop in log quick on $ext_if from >> >> [...later in the rules section...] >>

Re: Thousands of ssh probes

2010-03-05 Thread John
On Fri, Mar 05, 2010 at 05:54:50PM +0100, Matthias Fechner wrote: > Hi, > > Am 05.03.10 17:01, schrieb Matthew Seaman: > >table persist > >[...near the top of the rules section...] > >block drop in log quick on $ext_if from > > > >[...later in the rules section...] > >pass in on $ext_if proto tcp

Re: Thousands of ssh probes

2010-03-05 Thread Matthias Fechner
Hi, Am 05.03.10 17:01, schrieb Matthew Seaman: table persist [...near the top of the rules section...] block drop in log quick on $ext_if from [...later in the rules section...] pass in on $ext_if proto tcp \ from any to $ext_if port ssh \ flags S/SA keep state\

Re: Thousands of ssh probes

2010-03-05 Thread Kevin Kinsey
mikel king wrote: Way back about 10 years ago, I was playing around with IPFW a lot. I wrote a script to update IPFW from changes made to a MySql db. It was a just for fun project, that turned out to be rather useful I have some developers that I managed who like you were road warriors. They

Re: Thousands of ssh probes

2010-03-05 Thread Matthew Seaman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/03/2010 16:12:11, Randal L. Schwartz wrote: >> "Matthew" == Matthew Seaman writes: > > Matthew> On 05/03/2010 15:51:52, Randal L. Schwartz wrote: >>> The spamtrap is a shiny object for spam, and anything that goes there gets >>> blocked for

Re: Thousands of ssh probes

2010-03-05 Thread Randal L. Schwartz
> "Matthew" == Matthew Seaman writes: Matthew> On 05/03/2010 15:51:52, Randal L. Schwartz wrote: >> The spamtrap is a shiny object for spam, and anything that goes there gets >> blocked for an hour from hitting the low port. I presented this at a >> conference once. Matthew> Having an IPv6-

Re: Thousands of ssh probes

2010-03-05 Thread Matthew Seaman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/03/2010 15:51:52, Randal L. Schwartz wrote: > The spamtrap is a shiny object for spam, and anything that goes there gets > blocked for an hour from hitting the low port. I presented this at a > conference once. Having an IPv6-only high-mx seems

Re: Thousands of ssh probes

2010-03-05 Thread Matthew Seaman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/03/2010 15:44:39, John wrote: > Maybe I'll have to learn how to do a VPN from FreeBSD > > One thought that occurs to me is that pf tables would provide a > direct API without having to hit a database. > > I think I really like this. I may

Re: Thousands of ssh probes

2010-03-05 Thread mikel king
On Mar 5, 2010, at 10:44 AM, John wrote: On Fri, Mar 05, 2010 at 10:19:09AM -0500, mikel king wrote: On Mar 5, 2010, at 8:26 AM, John wrote: Way back about 10 years ago, I was playing around with IPFW a lot. I wrote a script to update IPFW from changes made to a MySql db. It was a just for f

Re: Thousands of ssh probes

2010-03-05 Thread Randal L. Schwartz
> "John" == John writes: John> Yes - that's exactly what I used to do, and exactly why I used to do John> it, but now I'm thinking of actually implement https. Rent more than one IP. :) I have a block of 8 for exactly that reason. It allows me to run sshd on 443 *and* https on a different

Re: Thousands of ssh probes

2010-03-05 Thread John
On Fri, Mar 05, 2010 at 07:45:02AM -0800, Randal L. Schwartz wrote: > > "Anton" == Anton writes: > > Anton>But, to allow acces for yourself - you could install wonderfull > Anton>utility = 'knock-knock'. > > Port knocking is false security. > > It's equivalent to adding precisely t

Re: Thousands of ssh probes

2010-03-05 Thread Randal L. Schwartz
> "Anton" == Anton writes: Anton>But, to allow acces for yourself - you could install wonderfull Anton>utility = 'knock-knock'. Port knocking is false security. It's equivalent to adding precisely two bytes (per knock, which can't be too close or far apart or numerous) to the key l

Re: Thousands of ssh probes

2010-03-05 Thread John
On Fri, Mar 05, 2010 at 10:19:09AM -0500, mikel king wrote: > > On Mar 5, 2010, at 8:26 AM, John wrote: > > >On Fri, Mar 05, 2010 at 07:03:53AM -0600, Programmer In Training > >wrote: > >>On 03/05/10 06:54, John wrote: > >>>My nightly security logs have thousands upon thousands of ssh probes >

Re: Thousands of ssh probes

2010-03-05 Thread mikel king
On Mar 5, 2010, at 8:26 AM, John wrote: On Fri, Mar 05, 2010 at 07:03:53AM -0600, Programmer In Training wrote: On 03/05/10 06:54, John wrote: My nightly security logs have thousands upon thousands of ssh probes in them. One day, over 6500. This is enough that I can actually "feel" it in m

Re: Thousands of ssh probes

2010-03-05 Thread Leslie Jensen
On 2010-03-05 13:54, John wrote: My nightly security logs have thousands upon thousands of ssh probes in them. One day, over 6500. This is enough that I can actually "feel" it in my network performance. Other than changing ssh to a non-standard port - is there a way to deal with these? Ever

Re: Thousands of ssh probes

2010-03-05 Thread John
On Fri, Mar 05, 2010 at 07:03:53AM -0600, Programmer In Training wrote: > On 03/05/10 06:54, John wrote: > > My nightly security logs have thousands upon thousands of ssh probes > > in them. One day, over 6500. This is enough that I can actually > > "feel" it in my network performance. Other tha

Re: Thousands of ssh probes

2010-03-05 Thread Eitan Adler
On Fri, Mar 5, 2010 at 2:54 PM, John wrote: > My nightly security logs have thousands upon thousands of ssh probes > in them.  One day, over 6500.  This is enough that I can actually > "feel" it in my network performance.  Other than changing ssh to > a non-standard port - is there a way to deal w

Re: Thousands of ssh probes

2010-03-05 Thread Programmer In Training
On 03/05/10 06:54, John wrote: > My nightly security logs have thousands upon thousands of ssh probes > in them. One day, over 6500. This is enough that I can actually > "feel" it in my network performance. Other than changing ssh to > a non-standard port - is there a way to deal with these? Ev