Ah yeah, i actually tried john the ripper, but some of my users only exist for a week or so, so its not exactly practical to run it every time a new user is made. But i do run it from time to time anyways.

Most of my authentication on my system is done via pam. I was wondering if there was a way to enforce stricter policys such locking IPs out for a few hours at a time after 10 login failures in X amount of time or something like that. I have a fairly limited understanding of PAM and how to configure it and dont know if this feasible. Also I very vaguely remember reading somewhere about automated IP blacklists of some sort: I realize that this would only cover people with static IPs, but i was thinking -- if they did exist -- somehow getting my firewall to use one might be a step in the right direction.

Thanks for all the feedback,
Michael

Rob wrote:

On Wed, Sep 14, 2005 at 10:32:59AM -0400, Don Schmadel wrote:
Several months ago my machine was compromised through ssh by a system in the Netherlands. They gained access through a user with an easy password and then used "su" along with an enormous list of password combinations to get root access. Finally they installed a "root kit" which caused my machine to attempt to compromise others.

The only way to be safe is to:

1)carefully check your ssh config file to make sure that "admin", "test",
      and similar users do not have access

  2)use long (more than 8 characters), very random passwords. "root kits
      contain entire dictionaries which they use for sample passwords.

3)put any sensitive info on an encrypted partition and demount it when you are not accessing it.

With "root kits" attacks can come from your nearest neighbor, so blocking is of little use.

Something else that is useful is to regularly run John the Ripper
(http://www.openwall.com/john/) or similar on your password file to
make sure that users are picking good passwords.  Having poor passwords
creates all kinds of problems (as I guess you found out ;-( ).

- Rob
.

Reply via email to