I am running 8.1 BETA. My server started getting hammered with brute force ssh login attacks recently. One thing I have noticed is that I see lots of these:
Jun 18 23:26:47 www3 sshd[33171]: error: ssh_msg_send: write
Jun 18 23:26:47 www3 sshd[33169]: error: ssh_msg_send: write
Jun 18 23:26:47 www3 sshd[33172]: error: ssh_msg_send: write
Jun 18 23:26:47 www3 sshd[33176]: error: ssh_msg_send: write
Jun 18 23:26:47 www3 sshd[33175]: error: ssh_msg_send: write
Jun 18 23:26:47 www3 sshd[33170]: error: ssh_msg_send: write
Jun 18 23:26:47 www3 sshd[33174]: error: ssh_msg_send: write
Jun 18 23:28:30 www3 sshd[33254]: error: ssh_msg_send: write
Jun 18 23:28:30 www3 sshd[33255]: error: ssh_msg_send: write
in my logs, which roughly correlates to when the problems start. I have sshguard running, so I am thinking that the above messages are happening because ipf has cut off communication with the host.

Anyhow, at some point, and for some reason, ssshd stops processing new requests. The sshed process continues to run, but simply does not work. From a the side of a system trying to log in, I see this (logging set to DEBUG in sshd_config:
> ssh -v u...@www3.stelesys.com
OpenSSH_5.2p1 FreeBSD-20090522, OpenSSL 0.9.8k 25 Mar 2009
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Connecting to www3.stelesys.com [69.61.23.66] port 22.
debug1: Connection established.
debug1: identity file /home/user/.ssh/identity type -1
debug1: identity file /home/user/.ssh/id_rsa type -1
debug1: identity file /home/user/.ssh/id_dsa type -1
ssh_exchange_identification: Connection closed by remote host

On the server side, I see this in the debug logs:
Jun 20 22:43:11 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 22:43:11 www3 sshd[76171]: debug1: drop connection #10


I happened to catch one in the act... This log snipped starts with sshd being started, is "attacked" by one host and ends with the sshd server locking up:
Jun 20 21:44:18 www3 sshd[76171]: debug1: Bind to port 22 on ::.
Jun 20 21:44:18 www3 sshd[76171]: debug1: Bind to port 22 on 0.0.0.0.
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: Forked child 76179.
Jun 20 21:44:53 www3 sshd[76179]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
Jun 20 21:44:53 www3 sshd[76179]: debug1: inetd sockets after dupping: 3, 3
Jun 20 21:44:53 www3 sshd[76179]: debug1: res_init()
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: Forked child 76180.
Jun 20 21:44:53 www3 sshd[76180]: debug1: rexec start in 5 out 5 newsock 5 pipe 8 sock 9
Jun 20 21:44:53 www3 sshd[76180]: debug1: inetd sockets after dupping: 3, 3
Jun 20 21:44:53 www3 sshd[76180]: debug1: res_init()
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: Forked child 76181.
Jun 20 21:44:53 www3 sshd[76181]: debug1: rexec start in 5 out 5 newsock 5 pipe 9 sock 10
Jun 20 21:44:53 www3 sshd[76181]: debug1: inetd sockets after dupping: 3, 3
Jun 20 21:44:53 www3 sshd[76181]: debug1: res_init()
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: Forked child 76182.
Jun 20 21:44:53 www3 sshd[76182]: debug1: rexec start in 5 out 5 newsock 5 pipe 10 sock 11
Jun 20 21:44:53 www3 sshd[76182]: debug1: inetd sockets after dupping: 3, 3
Jun 20 21:44:53 www3 sshd[76182]: debug1: res_init()
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: Forked child 76183.
Jun 20 21:44:53 www3 sshd[76183]: debug1: rexec start in 5 out 5 newsock 5 pipe 11 sock 12
Jun 20 21:44:53 www3 sshd[76183]: debug1: inetd sockets after dupping: 3, 3
Jun 20 21:44:53 www3 sshd[76183]: debug1: res_init()
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: Forked child 76184.
Jun 20 21:44:53 www3 sshd[76184]: debug1: rexec start in 5 out 5 newsock 5 pipe 12 sock 13
Jun 20 21:44:53 www3 sshd[76184]: debug1: inetd sockets after dupping: 3, 3
Jun 20 21:44:53 www3 sshd[76184]: debug1: res_init()
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: Forked child 76185.
Jun 20 21:44:53 www3 sshd[76185]: debug1: rexec start in 5 out 5 newsock 5 pipe 13 sock 14
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: Forked child 76186.
Jun 20 21:44:53 www3 sshd[76186]: debug1: rexec start in 5 out 5 newsock 5 pipe 14 sock 15
Jun 20 21:44:53 www3 sshd[76185]: debug1: inetd sockets after dupping: 3, 3
Jun 20 21:44:53 www3 sshd[76185]: debug1: res_init()
Jun 20 21:44:53 www3 sshd[76186]: debug1: inetd sockets after dupping: 3, 3
Jun 20 21:44:53 www3 sshd[76186]: debug1: res_init()
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: Forked child 76187.
Jun 20 21:44:53 www3 sshd[76187]: debug1: rexec start in 5 out 5 newsock 5 pipe 15 sock 16
Jun 20 21:44:53 www3 sshd[76187]: debug1: inetd sockets after dupping: 3, 3
Jun 20 21:44:53 www3 sshd[76187]: debug1: res_init()
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: Forked child 76188.
Jun 20 21:44:53 www3 sshd[76188]: debug1: rexec start in 5 out 5 newsock 5 pipe 16 sock 17
Jun 20 21:44:53 www3 sshd[76188]: debug1: inetd sockets after dupping: 3, 3
Jun 20 21:44:53 www3 sshd[76188]: debug1: res_init()
Jun 20 21:44:53 www3 sshd[76183]: debug1: Client protocol version 2.0; client software version libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76183]: debug1: no match: libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76183]: debug1: Enabling compatibility mode for protocol 2.0 Jun 20 21:44:53 www3 sshd[76183]: debug1: Local version string SSH-2.0-OpenSSH_5.4p1 FreeBSD-20100308 Jun 20 21:44:53 www3 sshd[76179]: debug1: Client protocol version 2.0; client software version libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76179]: debug1: no match: libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76179]: debug1: Enabling compatibility mode for protocol 2.0 Jun 20 21:44:53 www3 sshd[76179]: debug1: Local version string SSH-2.0-OpenSSH_5.4p1 FreeBSD-20100308
Jun 20 21:44:53 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:44:53 www3 sshd[76171]: debug1: drop connection #10
Jun 20 21:44:53 www3 sshd[76182]: debug1: Client protocol version 2.0; client software version libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76182]: debug1: no match: libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76182]: debug1: Enabling compatibility mode for protocol 2.0 Jun 20 21:44:53 www3 sshd[76182]: debug1: Local version string SSH-2.0-OpenSSH_5.4p1 FreeBSD-20100308 Jun 20 21:44:53 www3 sshd[76181]: debug1: Client protocol version 2.0; client software version libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76181]: debug1: no match: libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76181]: debug1: Enabling compatibility mode for protocol 2.0 Jun 20 21:44:53 www3 sshd[76181]: debug1: Local version string SSH-2.0-OpenSSH_5.4p1 FreeBSD-20100308 Jun 20 21:44:53 www3 sshd[76185]: debug1: Client protocol version 2.0; client software version libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76185]: debug1: no match: libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76185]: debug1: Enabling compatibility mode for protocol 2.0 Jun 20 21:44:53 www3 sshd[76185]: debug1: Local version string SSH-2.0-OpenSSH_5.4p1 FreeBSD-20100308 Jun 20 21:44:53 www3 sshd[76184]: debug1: Client protocol version 2.0; client software version libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76184]: debug1: no match: libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76184]: debug1: Enabling compatibility mode for protocol 2.0 Jun 20 21:44:53 www3 sshd[76184]: debug1: Local version string SSH-2.0-OpenSSH_5.4p1 FreeBSD-20100308 Jun 20 21:44:53 www3 sshd[76186]: debug1: Client protocol version 2.0; client software version libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76186]: debug1: no match: libssh-0.4.3
Jun 20 21:44:53 www3 sshd[76186]: debug1: Enabling compatibility mode for protocol 2.0 Jun 20 21:44:53 www3 sshd[76186]: debug1: Local version string SSH-2.0-OpenSSH_5.4p1 FreeBSD-20100308 Jun 20 21:44:54 www3 sshd[76188]: debug1: Client protocol version 2.0; client software version libssh-0.4.3
Jun 20 21:44:54 www3 sshd[76188]: debug1: no match: libssh-0.4.3
Jun 20 21:44:54 www3 sshd[76188]: debug1: Enabling compatibility mode for protocol 2.0 Jun 20 21:44:54 www3 sshd[76188]: debug1: Local version string SSH-2.0-OpenSSH_5.4p1 FreeBSD-20100308 Jun 20 21:44:54 www3 sshd[76187]: debug1: Client protocol version 2.0; client software version libssh-0.4.3
Jun 20 21:44:54 www3 sshd[76187]: debug1: no match: libssh-0.4.3
Jun 20 21:44:54 www3 sshd[76187]: debug1: Enabling compatibility mode for protocol 2.0 Jun 20 21:44:54 www3 sshd[76187]: debug1: Local version string SSH-2.0-OpenSSH_5.4p1 FreeBSD-20100308 Jun 20 21:44:56 www3 sshguard[71398]: Matched address 222.177.24.35:4 attacking service 100
Jun 20 21:44:56 www3 last message repeated 3 times
Jun 20 21:44:56 www3 sshguard[71398]: First sight of offender '222.177.24.35:4', adding to offenders list. Jun 20 21:44:56 www3 sshguard[71398]: Setting environment: SSHG_ADDR=222.177.24.35;SSHG_ADDRKIND=4;SSHG_SERVICE=100.
Jun 20 21:44:56 www3 sshd[76184]: debug1: PAM: initializing for "ircd"
Jun 20 21:44:56 www3 sshd[76185]: debug1: PAM: initializing for "ircd"
Jun 20 21:44:56 www3 sshd[76186]: debug1: PAM: initializing for "ircd"
Jun 20 21:44:56 www3 sshd[76183]: debug1: PAM: initializing for "ircd"
Jun 20 21:44:56 www3 sshd[76179]: debug1: PAM: initializing for "ircd"
Jun 20 21:44:56 www3 sshd[76184]: debug1: PAM: setting PAM_RHOST to "222.177.24.35"
Jun 20 21:44:56 www3 sshd[76181]: debug1: PAM: initializing for "ircd"
Jun 20 21:44:56 www3 sshd[76182]: debug1: PAM: initializing for "ircd"
Jun 20 21:44:56 www3 sshd[76186]: debug1: PAM: setting PAM_RHOST to "222.177.24.35" Jun 20 21:44:56 www3 sshd[76185]: debug1: PAM: setting PAM_RHOST to "222.177.24.35" Jun 20 21:44:56 www3 sshd[76183]: debug1: PAM: setting PAM_RHOST to "222.177.24.35" Jun 20 21:44:56 www3 sshd[76179]: debug1: PAM: setting PAM_RHOST to "222.177.24.35" Jun 20 21:44:56 www3 sshd[76181]: debug1: PAM: setting PAM_RHOST to "222.177.24.35" Jun 20 21:44:56 www3 sshd[76182]: debug1: PAM: setting PAM_RHOST to "222.177.24.35" Jun 20 21:44:56 www3 sshguard[71398]: Run command "if test $SSHG_ADDRKIND != 4; then exit 1 ; fi ; TMP=`mktemp /tmp/ipfconf.XX` && awk '1 ; /^##sshguard-begin##$/ { print "block in quick proto tcp from '"$SSHG_ADDR"' to any" }' </etc/ipf.rules > $TMP && mv $TMP /etc/ipf.rules && /sbin/ipf -Fa && /sbin/ipf -f /etc/ipf.rules": exited 0. Jun 20 21:44:56 www3 sshguard[71398]: Matched address 222.177.24.35:4 attacking service 100
Jun 20 21:44:56 www3 last message repeated 3 times
Jun 20 21:44:56 www3 sshguard[71398]: Setting environment: SSHG_ADDR=222.177.24.35;SSHG_ADDRKIND=4;SSHG_SERVICE=100. Jun 20 21:44:56 www3 sshguard[71398]: Run command "if test $SSHG_ADDRKIND != 4; then exit 1 ; fi ; TMP=`mktemp /tmp/ipfconf.XX` && awk '1 ; /^##sshguard-begin##$/ { print "block in quick proto tcp from '"$SSHG_ADDR"' to any" }' </etc/ipf.rules > $TMP && mv $TMP /etc/ipf.rules && /sbin/ipf -Fa && /sbin/ipf -f /etc/ipf.rules": exited 0. Jun 20 21:44:56 www3 sshguard[71398]: Matched address 222.177.24.35:4 attacking service 100
Jun 20 21:44:56 www3 last message repeated 3 times
Jun 20 21:44:56 www3 sshguard[71398]: Setting environment: SSHG_ADDR=222.177.24.35;SSHG_ADDRKIND=4;SSHG_SERVICE=100. Jun 20 21:44:56 www3 sshguard[71398]: Run command "if test $SSHG_ADDRKIND != 4; then exit 1 ; fi ; TMP=`mktemp /tmp/ipfconf.XX` && awk '1 ; /^##sshguard-begin##$/ { print "block in quick proto tcp from '"$SSHG_ADDR"' to any" }' </etc/ipf.rules > $TMP && mv $TMP /etc/ipf.rules && /sbin/ipf -Fa && /sbin/ipf -f /etc/ipf.rules": exited 0. Jun 20 21:44:56 www3 sshguard[71398]: Matched address 222.177.24.35:4 attacking service 100 Jun 20 21:44:56 www3 sshguard[71398]: Matched address 222.177.24.35:4 attacking service 100
Jun 20 21:45:33 www3 sshd[76171]: debug1: fd 5 clearing O_NONBLOCK
Jun 20 21:45:33 www3 sshd[76171]: debug1: drop connection #10



After some period of time, it *sometimes* starts accepting connections again. Any ideas what is happening here?

Thanks,

Jerry


_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"

Reply via email to