Re: [opensuse] dictionary attacks

2007-07-30 Thread Sloan
Patrick Shanahan wrote: * Richard Creighton [EMAIL PROTECTED] [07-29-07 15:46]: I don't think he wants to block off the public, just someone he has detected abusing. exactly and I am presently using fail2ban to block: [postfix-tcpwrapper] enabled = true filter =

Re: [opensuse] dictionary attacks

2007-07-30 Thread Patrick Shanahan
* Sloan [EMAIL PROTECTED] [07-30-07 13:10]: So, any host that has a lot of messages to send to users on your system will be banned, correct? We frequently have occasion to send thousands of business-related messages to a single domain, and if they use some simple-minded smtp connection rate

Re: [opensuse] dictionary attacks

2007-07-30 Thread John Andersen
On Sunday 29 July 2007, Patrick Shanahan wrote: * Richard Creighton [EMAIL PROTECTED] [07-29-07 15:46]: I don't think he wants to block off the public, just someone he has detected abusing. exactly and I am presently using fail2ban to block: [postfix-tcpwrapper] enabled = true

Re: [opensuse] dictionary attacks

2007-07-30 Thread Sloan
Patrick Shanahan wrote: * Sloan [EMAIL PROTECTED] [07-30-07 13:10]: So, any host that has a lot of messages to send to users on your system will be banned, correct? We frequently have occasion to send thousands of business-related messages to a single domain, and if they use some

Re: [opensuse] dictionary attacks

2007-07-30 Thread Patrick Shanahan
* Sloan [EMAIL PROTECTED] [07-30-07 14:58]: I'm curious about the mechanism by which fail2ban determines what is legitimate high volume mail, and what is spam... Unfortunately messages can bounce due to various causes on the receiving end, including users who have moved on but haven't let all

Re: [opensuse] dictionary attacks

2007-07-30 Thread Sloan
Patrick Shanahan wrote: a little quote trimming would be nice :^) from my logs: /var/log/mail: Jul 30 14:13:06 wahoo postfix/smtpd[488]: connect from edu194.internetdsl.tpnet.pl[83.14.202.194] Jul 30 14:13:18 wahoo postfix/smtpd[488]: NOQUEUE: reject: RCPT from

Re: [opensuse] dictionary attacks

2007-07-30 Thread Patrick Shanahan
* Sloan [EMAIL PROTECTED] [07-30-07 15:27]: Interesting - but with RBLs you sometimes have innocent senders tarred with the same brush as the spammers, so if it's problematic to ban based on the RBLs. rbl blocked 1000 posts the 28th and 600 yesterday. I correspond with several people who

Re: [opensuse] dictionary attacks

2007-07-29 Thread Patrick Shanahan
* Benji Weber [EMAIL PROTECTED] [07-16-07 05:04]: set the following line FW_SERVICES_ACCEPT_EXT=0/0,tcp,22,,hitcount=3,blockseconds=120,recentname=ssh in /etc/sysconfig/SuSEfirewall2 This will limit to a maximum of 3 attempts per 120s. This works *very* well, even better than fail2ban,

Re: [opensuse] dictionary attacks

2007-07-29 Thread Richard Creighton
Patrick Shanahan wrote: * Benji Weber [EMAIL PROTECTED] [07-16-07 05:04]: set the following line FW_SERVICES_ACCEPT_EXT=0/0,tcp,22,,hitcount=3,blockseconds=120,recentname=ssh in /etc/sysconfig/SuSEfirewall2 This will limit to a maximum of 3 attempts per 120s. This works *very* well,

Re: [opensuse] dictionary attacks

2007-07-29 Thread Benji Weber
On 29/07/07, Richard Creighton [EMAIL PROTECTED] wrote: Turns out that I have spent the morning trying to figure out why on my machine that didn't work at all. I perused the iptables -L and found the order of the rules produced by susefirewall2 is wrong IF you open the ssh port using the

Re: [opensuse] dictionary attacks

2007-07-29 Thread joe
Patrick Shanahan wrote: * Benji Weber [EMAIL PROTECTED] [07-16-07 05:04]: set the following line FW_SERVICES_ACCEPT_EXT=0/0,tcp,22,,hitcount=3,blockseconds=120,recentname=ssh in /etc/sysconfig/SuSEfirewall2 This will limit to a maximum of 3 attempts per 120s. This works *very* well,

Re: [opensuse] dictionary attacks

2007-07-29 Thread Richard Creighton
joe wrote: Patrick Shanahan wrote: * Benji Weber [EMAIL PROTECTED] [07-16-07 05:04]: set the following line FW_SERVICES_ACCEPT_EXT=0/0,tcp,22,,hitcount=3,blockseconds=120,recentname=ssh in /etc/sysconfig/SuSEfirewall2 This will limit to a maximum of 3 attempts per 120s. This works

Re: [opensuse] dictionary attacks

2007-07-29 Thread Patrick Shanahan
* Richard Creighton [EMAIL PROTECTED] [07-29-07 15:46]: I don't think he wants to block off the public, just someone he has detected abusing. exactly and I am presently using fail2ban to block: [postfix-tcpwrapper] enabled = true filter = postfix action =

Re: [opensuse] dictionary attacks

2007-07-29 Thread joe
Richard Creighton wrote: I don't think he wants to block off the public, just someone he has detected abusing. I have a friend that has a small newsletter she sends out to a growing list of people and recently she hit a limit from road-runner. She could receive mail just fine but when

Re: [opensuse] dictionary attacks

2007-07-18 Thread Joe Sloan
On Jul 17, 2007, at 1:34 PM, Richard Creighton wrote: Patrick Shanahan wrote: * Richard Creighton [EMAIL PROTECTED] [07-17-07 16:09]: Starting Firewall Initialization (phase 2 of 2) SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.

Re: [opensuse] dictionary attacks

2007-07-18 Thread Richard Creighton
Joe Sloan wrote: On Jul 17, 2007, at 1:34 PM, Richard Creighton wrote: Patrick Shanahan wrote: Prayer is cool, but why a reboot? This isn't windoze, no need. Just tell the firewall to reload, takes a second. Joe Oh you don't know how much I know this isn't WindozeDa I

Re: [opensuse] dictionary attacks

2007-07-17 Thread Verner Kjærsgaard
Mandag 16 juli 2007 18:00 skrev joe: Richard Creighton wrote: Just about every day, often several times a day, my logs include hours of log entries that look like this: Jul 16 00:35:25 raid5 sshd[6966]: Invalid user admin from 83.18.244.42 snip My question is what, if any firewall

Re: [opensuse] dictionary attacks

2007-07-17 Thread G T Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 John Andersen wrote: On Monday 16 July 2007, G T Smith wrote: The real problem starts when the attacker hits pay dirt, the entries I would worry about are the ones that are not in the log. Paydirt? You mean like guessing BOTH the account name

Re: [opensuse] dictionary attacks

2007-07-17 Thread Richard Creighton
John, you have been a tremendous amount of help. I am posting my reply to the list as well as direct to you because your answer may be of benefit to the list members and the question I pose may also be of significance John Andersen wrote: On Tuesday 17 July 2007, Richard Creighton wrote:

Re: [opensuse] dictionary attacks

2007-07-17 Thread John Andersen
On Tuesday 17 July 2007, Richard Creighton wrote: But in any event, I don't believe its being honored. Ok, its safe to say you have rate limit installed and available What I'm wondering is if it *is* being honored as far as the hacker is concerned, ie, he is not getting past the 'DROP',

Re: [opensuse] dictionary attacks

2007-07-17 Thread Richard Creighton
John Andersen wrote: On Tuesday 17 July 2007, Richard Creighton wrote: But if the logging shows up prefixed with sshd as yours does: Jul 17 00:38:27 raid5 sshd Then you can be assured that the connection attempt DID get to the ssh daemon, and was NOT dropped. If it was dropped the sshd

Re: [opensuse] dictionary attacks

2007-07-17 Thread Patrick Shanahan
* Richard Creighton [EMAIL PROTECTED] [07-17-07 16:09]: Starting Firewall Initialization (phase 2 of 2) SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled. SuSEfirewall2: Error: unknown parameter name=ssh in FW_SERVICES_ACCEPT_EXT -

Re: [opensuse] dictionary attacks

2007-07-17 Thread John Andersen
On Tuesday 17 July 2007, Richard Creighton wrote: John Andersen wrote: On Tuesday 17 July 2007, Richard Creighton wrote: But if the logging shows up prefixed with sshd as yours does: Jul 17 00:38:27 raid5 sshd Then you can be assured that the connection attempt DID get to the ssh

Re: [opensuse] dictionary attacks

2007-07-17 Thread Richard Creighton
Patrick Shanahan wrote: * Richard Creighton [EMAIL PROTECTED] [07-17-07 16:09]: Starting Firewall Initialization (phase 2 of 2) SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled. SuSEfirewall2: Error: unknown parameter name=ssh in

Re: [opensuse] dictionary attacks

2007-07-17 Thread Richard Creighton
Patrick Shanahan wrote: * Richard Creighton [EMAIL PROTECTED] [07-17-07 16:09]: Starting Firewall Initialization (phase 2 of 2) SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled. SuSEfirewall2: Error: unknown parameter name=ssh in

Re: [opensuse] dictionary attacks

2007-07-17 Thread Dale Schuster
Richard Creighton [EMAIL PROTECTED] wrote on 07/17/2007 02:02:51 PM: Thanks to all that have endured this thread and to all that have contributed their ideas. BTW, I did install 'fail2ban' and it did execute but it never caught any attacks...so obviously I screwed up in configuration somehow

Re: [opensuse] dictionary attacks

2007-07-17 Thread Patrick Shanahan
* Richard Creighton [EMAIL PROTECTED] [07-17-07 17:05]: Thank you very muchObviously despite everything, I must have fat-fingered something somewhere. After a cut and paste session PLUS a system reboot (something I very rarely do in Linux), I ended up with: ... A quick simple solution

Re: [opensuse] dictionary attacks

2007-07-17 Thread John Andersen
On Tuesday 17 July 2007, Dale Schuster wrote: Richard Creighton [EMAIL PROTECTED] wrote on 07/17/2007 02:02:51 PM: Thanks to all that have endured this thread and to all that have contributed their ideas. BTW, I did install 'fail2ban' and it did execute but it never caught any

[opensuse] dictionary attacks

2007-07-16 Thread Richard Creighton
Just about every day, often several times a day, my logs include hours of log entries that look like this: Jul 16 00:35:25 raid5 sshd[6966]: Invalid user admin from 83.18.244.42 Jul 16 00:35:30 raid5 sshd[6968]: Invalid user admin from 83.18.244.42 Jul 16 00:35:35 raid5 sshd[6972]: Invalid user

Re: [opensuse] dictionary attacks

2007-07-16 Thread Benji Weber
On 16/07/07, Richard Creighton [EMAIL PROTECTED] wrote: My question is what, if any firewall rule could I write that could detect such attacks and automatically shut down forwarding packets from the offending node or domain? That would give me an additional layer of defense as well as

Re: [opensuse] dictionary attacks

2007-07-16 Thread G T Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Richard Creighton wrote: Just about every day, often several times a day, my logs include hours of log entries that look like this: Jul 16 00:35:25 raid5 sshd[6966]: Invalid user admin from 83.18.244.42 Jul 16 00:35:30 raid5 sshd[6968]: Invalid

Re: [opensuse] dictionary attacks

2007-07-16 Thread Matthew Stringer
On Monday 16 July 2007 10:02:54 G T Smith wrote: Richard Creighton wrote: Just about every day, often several times a day, my logs include hours of log entries that look like this: Jul 16 00:35:25 raid5 sshd[6966]: Invalid user admin from 83.18.244.42 Jul 16 00:35:30 raid5 sshd[6968]:

Re: [opensuse] dictionary attacks

2007-07-16 Thread koffiejunkie
Matthew Stringer wrote: After having a similar problem I was recommended DenyHosts, swear by it now, blocks all these lamers. http://www.howtoforge.com/preventing_ssh_dictionary_attacks_with_denyhosts Cheers, Matthew I'll vote for this too, although I would like to get something that uses

Re: [opensuse] dictionary attacks

2007-07-16 Thread Carlos E. R.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The Monday 2007-07-16 at 11:09 +0100, koffiejunkie wrote: I'll vote for this too, although I would like to get something that uses iptables instead - taking the load off sshd. SuSEfirewall2 does it that way - see Benji Weber answer. - --

Re: [opensuse] dictionary attacks

2007-07-16 Thread Richard Creighton
Benji Weber wrote: On 16/07/07, Richard Creighton [EMAIL PROTECTED] wrote: My question is what, if any firewall rule could I write that could detect such attacks and automatically shut down forwarding packets from the offending node or domain? That would give me an additional layer of

Re: [opensuse] dictionary attacks

2007-07-16 Thread Carlos E. R.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The Monday 2007-07-16 at 08:19 -0400, Richard Creighton wrote: FW_SERVICES_ACCEPT_EXT=0/0,tcp,22,,hitcount=3,blockseconds=120,recentname=ssh in /etc/sysconfig/SuSEfirewall2 This will limit to a maximum of 3 attempts per 120s. The log

Re: [opensuse] dictionary attacks

2007-07-16 Thread joe
Richard Creighton wrote: Just about every day, often several times a day, my logs include hours of log entries that look like this: Jul 16 00:35:25 raid5 sshd[6966]: Invalid user admin from 83.18.244.42 snip My question is what, if any firewall rule could I write that could detect such

Re: [opensuse] dictionary attacks

2007-07-16 Thread joe
joe wrote: Richard Creighton wrote: Just about every day, often several times a day, my logs include hours of log entries that look like this: Jul 16 00:35:25 raid5 sshd[6966]: Invalid user admin from 83.18.244.42 snip My question is what, if any firewall rule could I write that

Re: [opensuse] dictionary attacks

2007-07-16 Thread G T Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 joe wrote: joe wrote: Richard Creighton wrote: I prefer a more simple approach. Rather than adding more firewall rules, I set the sshd allowed_users parameter to the 2 accounts that actually have a reason to log in, and I also limit the IP

Re: [opensuse] dictionary attacks

2007-07-16 Thread Theo v. Werkhoven
Mon, 16 Jul 2007, by [EMAIL PROTECTED]: Just about every day, often several times a day, my logs include hours of log entries that look like this: Jul 16 00:35:25 raid5 sshd[6966]: Invalid user admin from 83.18.244.42 Jul 16 00:35:30 raid5 sshd[6968]: Invalid user admin from 83.18.244.42

Re: [opensuse] dictionary attacks

2007-07-16 Thread John Andersen
On Monday 16 July 2007, G T Smith wrote: The real problem starts when the attacker hits pay dirt, the entries I would worry about are the ones that are not in the log. Paydirt? You mean like guessing BOTH the account name and password? The chances of this are vanishingly slim with reasonable

Re: [opensuse] dictionary attacks

2007-07-16 Thread John Andersen
On Monday 16 July 2007, Richard Creighton wrote: The log excerpt was despite a setting of: FW_SERVICES_ACCEPT_EXT=0/0,tcp,22,,hitcount=5,blockseconds=300,recentname= ssh I don't believe you had that in there correctly, because if you look a the times there were cases where there were 5 hits