Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-06 Thread Joshua Murphy
On Fri, Dec 5, 2008 at 10:05 AM, Evgeniy Bushkov [EMAIL PROTECTED] wrote: Adam Carter пишет: Also take a note that there are no known-compromised hosts What about hosts listed in RBLs? http://en.wikipedia.org/wiki/Comparison_of_DNS_blacklists. It would be interesting to see if how much

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-05 Thread Steve
Alan McKinnon wrote: On Thursday 04 December 2008 21:03:17 Christian Franke wrote: I just don't see what blocking ssh-bruteforce attempts should be good for, at least on a server where few _users_ are active. Two reasons: a. Maybe, just maybe, you overlooked something. Belts,

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-05 Thread Evgeniy Bushkov
Adam Carter пишет: Also take a note that there are no known-compromised hosts What about hosts listed in RBLs? http://en.wikipedia.org/wiki/Comparison_of_DNS_blacklists. It would be interesting to see if how much correlation there is between ssh brute forcing bots and the contents of

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Evgeniy Bushkov
Steve пишет: I've recently discovered a curious pattern emerging in my system log with failed login attempts via ssh. Previously, I noticed dictionary attacks launched - which were easy to detect... and I've a process to block the IP address of any host that repeatedly fails to authenticate.

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Steve
Simon wrote: Since it is very unlikely that the attacker is targeting you specifically, changing the port number (and removing root access) will very likely stop the attack forever. Though, if the attacker did target you, then you will need some more security tools (intrusion detection,

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Dmitry S. Makovey
On December 3, 2008, Steve wrote: Dmitry S. Makovey wrote: Erm - surely I either need to set up my client to port-knock... which is a faff I'd rather avoid... in order to use the technique. nope. just start connection. wait a minute. cancel. start another one. wait a minute. cancel.

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Christian Franke
On 12/03/2008 09:02 PM, Steve wrote: I've recently discovered a curious pattern emerging in my system log with failed login attempts via ssh. I'm not particularly concerned - since I'm confident that all my users have strong passwords... but it strikes me that this data identifies a bot-net

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Dmitry S. Makovey
On December 4, 2008, Christian Franke wrote: I just don't see what blocking ssh-bruteforce attempts should be good for, at least on a server where few _users_ are active. Considering how much creative paranoia I've exposed in this thread it might come as a surprise, but I do agree with the

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Alan McKinnon
On Thursday 04 December 2008 21:03:17 Christian Franke wrote: On 12/03/2008 09:02 PM, Steve wrote: I've recently discovered a curious pattern emerging in my system log with failed login attempts via ssh. I'm not particularly concerned - since I'm confident that all my users have strong

RE: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Adam Carter
Also take a note that there are no known-compromised hosts What about hosts listed in RBLs? http://en.wikipedia.org/wiki/Comparison_of_DNS_blacklists. It would be interesting to see if how much correlation there is between ssh brute forcing bots and the contents of the various lists.

RE: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Adam Carter
Open a Wiki page on Wikipedia, update it every so often and provide simple parser for it so others can recycle same IPs. Since it's a Wiki page - others can update it as well (including botnet owners, but then they'd have to reveal themselves - tricky situation) :) Reveal themselves in what

RE: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Adam Carter
Also take a note that there are no known-compromised hosts What about hosts listed in RBLs? http://en.wikipedia.org/wiki/Comparison_of_DNS_blacklists. It would be interesting to see if how much correlation there is between ssh brute forcing bots and the contents of the various lists. Maybe

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Shawn Haggett
Dmitry S. Makovey wrote: On December 3, 2008, Steve wrote: Dmitry S. Makovey wrote: well. Nobody but you knows your requiremens and specifics - we're just listing options. It's up to you to either take 'em or leave 'em ;) Fair enough - but I've still not found an option for sharing/using

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Dmitry S. Makovey
On December 4, 2008, Adam Carter wrote: Open a Wiki page on Wikipedia, update it every so often and provide simple parser for it so others can recycle same IPs. Since it's a Wiki page - others can update it as well (including botnet owners, but then they'd have to reveal themselves -

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-04 Thread Mick
On Thursday 04 December 2008, Steve wrote: Simon wrote: Since it is very unlikely that the attacker is targeting you specifically, changing the port number (and removing root access) will very likely stop the attack forever. Though, if the attacker did target you, then you will need some

[gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Steve
I've recently discovered a curious pattern emerging in my system log with failed login attempts via ssh. Previously, I noticed dictionary attacks launched - which were easy to detect... and I've a process to block the IP address of any host that repeatedly fails to authenticate. What I see now

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Albert Hopkins
You could try sshguard or denyhosts.

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Paul Hartman
On Wed, Dec 3, 2008 at 2:02 PM, Steve [EMAIL PROTECTED] wrote: I've recently discovered a curious pattern emerging in my system log with failed login attempts via ssh. Previously, I noticed dictionary attacks launched - which were easy to detect... and I've a process to block the IP address

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Alan McKinnon
On Wednesday 03 December 2008 22:02:43 Steve wrote: I've recently discovered a curious pattern emerging in my system log with failed login attempts via ssh. Previously, I noticed dictionary attacks launched - which were easy to detect... and I've a process to block the IP address of any host

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Dmitry S. Makovey
On December 3, 2008, Steve wrote: Sure, I could use IPtables to block all these bad ports... or... I could disable password authentication entirely... but I keep thinking that there has to be something better I can do... any suggestions? Is there a simple way to integrate a block-list of

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Steve
Thanks for all the replies so far... I'll reply once to these... (Oh, and when I said ports in my original post, I meant addresses - my typing fingers just ignored my brain...) I'm against a 'novel port' approach - as I am against port-knocking (for my server) because these may prove challenging

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Dmitry S. Makovey
On December 3, 2008, Steve wrote: I have, in the past, used DSA only keys - but this was frustrating on several occasions when I wanted access to my server and didn't have my SSH keys available to me... I almost always connect using a key pair rather than a password - but the password option

RE: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Adam Carter
I previously used denyhosts - but (I can't remember why) it became preferable to block with IPtables rather than with tcpwrappers... which prompted me to dump it in favour of a bespoke script based upon blacklist.py (http://blinkeye.ch/mediawiki/index.php/SSH_Blocking) - though, now, I'm

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Steve
Dmitry S. Makovey wrote: P.S. I actually don't do any of the above. It was just a surge of creative paranoia in response to initial request :) All good ideas - except selling the blacklist... I'd be happiest to share my blacklist for free... my objective is to minimise exposure to botnets -

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Paul Hartman
On Wed, Dec 3, 2008 at 4:55 PM, Steve [EMAIL PROTECTED] wrote: Dmitry S. Makovey wrote: P.S. I actually don't do any of the above. It was just a surge of creative paranoia in response to initial request :) All good ideas - except selling the blacklist... I'd be happiest to share my

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Dmitry S. Makovey
On December 3, 2008, Paul Hartman wrote: Of course, this is assuming the botnet stops after rejected connections... oh no, not rejected - dropped ;) let them go through pains of timing out without knowing if anything is actually listening on the other side ;) -- Dmitry Makovey Web Systems

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Steve
Paul Hartman wrote: I think using Dmitry's idea of rejecting the first 2 connections, but then allowing it as normal on the third attempt would satisfy your requirements for being on the normal port, allowing all IPs and requiring no special setup on the client end (other than knowing they

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Dmitry S. Makovey
On December 3, 2008, Steve wrote: Paul Hartman wrote: I think using Dmitry's idea of rejecting the first 2 connections, but then allowing it as normal on the third attempt would satisfy your requirements for being on the normal port, allowing all IPs and requiring no special setup on the

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Steve
Dmitry S. Makovey wrote: Erm - surely I either need to set up my client to port-knock... which is a faff I'd rather avoid... in order to use the technique. nope. just start connection. wait a minute. cancel. start another one. wait a minute. cancel. start new one - voila! :) Eeew...

Re: [gentoo-user] Curious pattern in log files from ssh...

2008-12-03 Thread Simon
I noticed the same thing on my host several weeks ago. I strongly suggest removing root access to your ssh, root is probably being tried by more than 50% of all login attempts... the other trials are semi-intelligent random usernames (ie, users that might really well exists, like 'apache'