Re: [j-nsp] sshd log messages !!

2014-02-27 Thread Alex Arseniev
The filter the OP posted set firewall family inet filter Access term AllowSSH from address X.X.X.X/16 set firewall family inet filter Access term AllowSSH from address X.X.X.X/16 set firewall family inet filter Access term AllowSSH from address X.X.X.X/16 set firewall family inet filter Access ter

Re: [j-nsp] sshd log messages !!

2014-02-27 Thread Alex Arseniev
set firewall family inet filter Access term AllowSSH from address X.X.X.X/16 If X.X.X.X/16 includes any interface address of this router, then this filter is NOT going to stop attacks, no matter where applied. You should be much more specific in writing the match conditions. Below is an examp

Re: [j-nsp] sshd log messages !!

2014-02-27 Thread Phil Shafer
Ben Dale writes: >set system services ssh port <1024-65535> >... >maybe an "allow-sources" might be a bit more useful in this instance? Less >sophisticate >d users tend to shoot themselves in the foot with firewall filters quite >regularly. Would a firewall filter on lo0 be a better answer for

Re: [j-nsp] sshd log messages !!

2014-02-27 Thread Mark Tinka
On Thursday, February 27, 2014 02:13:42 PM Harri Makela wrote: > set interfaces ge-0/0/1 unit 0 family inet filter input > Access Your firewall needs to be configured on the Loopback interface, as that represents the router's control plane. > set interfaces lo0 unit 0 family inet filter input

Re: [j-nsp] sshd log messages !!

2014-02-27 Thread Harri Makela
Model: j6350 JUNOS Software Release [10.4R4.5] Following is the current configuration that we have for ssh:- set system login user xxx authentication ssh-rsa "ssh-rsa B" set system services ssh set security ssh-known-hosts host 10.x.x.x rsa-key set security ssh-known-hosts host 10.x.x.x

Re: [j-nsp] sshd log messages !!

2014-02-26 Thread Mark Tinka
On Thursday, February 27, 2014 01:14:26 AM Rodrigo Augusto wrote: > Protect your RE. Put a filter on your loopback and permit > only your netwoks to access this port(22). Yep. You really shouldn't let your SSH daemon have easy access to the world. Mark. signature.asc Description: This is a

Re: [j-nsp] sshd log messages !!

2014-02-26 Thread Ben Dale
If you're stuck with password-based login (rather than SSH keys), leave yourself one go at missing your password, then increase the backoff-factor up to 10 to put a 10-second wait for guess number 3: set system services ssh root-login deny set system login retry-options backoff-threshold 2 set s

Re: [j-nsp] sshd log messages !!

2014-02-26 Thread Yucong Sun
disable root-login will render most of attack useless. On Wed, Feb 26, 2014 at 8:56 PM, Phil Shafer wrote: > Rodrigo Augusto writes: >>Protect your RE. Put a filter on your loopback and permit only your netwoks >>to access th >>is port(22). > > Also consider disabling passwords completely. In 1

Re: [j-nsp] sshd log messages !!

2014-02-26 Thread Phil Shafer
Rodrigo Augusto writes: >Protect your RE. Put a filter on your loopback and permit only your netwoks to >access th >is port(22). Also consider disabling passwords completely. In 13.3 we introduced the [system services ssh no-passwords] flag that turns off password- based authentication, requirin

Re: [j-nsp] sshd log messages !!

2014-02-26 Thread Rodrigo Augusto
Protect your RE. Put a filter on your loopback and permit only your netwoks to access this port(22). Enviado via iPhone Grupo Connectoway > Em 26/02/2014, às 19:21, Harri Makela escreveu: > > Hi There > > I am constantly getting these log messages for last few days:- > > sshd[21015]: Failed

Re: [j-nsp] sshd log messages !!

2014-02-26 Thread Dermot Williams
On Wed, Feb 26, 2014 at 02:21:46PM -0800, Harri Makela wrote: > Hi There > > I am constantly getting these log messages for last few days:- > > sshd[21015]: Failed password for root from X.X.103.152 port 21067 ssh2 > sshd[21016]: Received disconnect from X.X.103.152: 11: Normal Shutdown, Thank >

[j-nsp] sshd log messages !!

2014-02-26 Thread Harri Makela
Hi There I am constantly getting these log messages for last few days:- sshd[21015]: Failed password for root from X.X.103.152 port 21067 ssh2 sshd[21016]: Received disconnect from X.X.103.152: 11: Normal Shutdown, Thank you for playing Are these indicating any brute-force attack ?Thanks HM