On December 2, 2011, Royce Souther wrote:
> If you watch TechSNAP it has more information.
> http://www.jupiterbroadcasting.com/14561/allans-zfs-server-build-techsnap-3
>4/
>
> PKI may not be enough, I am thinking that port knocking to restrict access
> to port 22 is a good idea now.

I believe the exploits were not 0-day, but rather a brute force attack using 
the root account.

As Gustin pointed out, the versions were very very old, and should have been 
patched.   Additionally setting "PermitRootLogin no" in sshd_config would 
have been a good thing.

Also, some sort of HIDS like ossec (http://www.ossec.net).  It has an 
active-response which will block the IPs using ipables from brute force 
attacks detected.


Andy

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to