* Michael Tautschnig <[EMAIL PROTECTED]> [2008-08-21 09:24-0400]:
> > * Michael Tautschnig <[EMAIL PROTECTED]> [2008-08-21 07:35-0400]:
> > > Hi all,
> > > 
> > > since two days (approx.) I'm seeing an extremely high number of apparently
> > > coordinated (well, at least they are trying the same list of usernames) 
> > > brute
> > > force attempts from IP addresses spread all over the world. I've got 
> > > denyhosts
> > > and an additional iptables based firewall solution in place to mitigate 
> > > these
> > > since quite some time already and this seems to do the trick in terms of
> > > blocking them fairly quickly.
> > 
> > I hope you are aware that its very trivial for a non-privileged user
> > on your system to issue a logger command to trigger a denyhosts DOS to
> > lock out anyone they want.
> > 
> 
> Hmm, no, not really - how would that work?

fail2ban and denyhosts watch log files for repeat failed ssh
authentication attempts from particular ips. Its quite trivial for a
non-privileged user to add entries to your logfiles using the syslog
facilities (try it yourself using 'logger'). You will quickly find
that you can very simply craft a log message that would be picked up
by these programs and be able to block an IP of your choosing.

micah


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to