What's the strategy for bad guys guessing a few ssh passwords?
Bruce Dawson
jbd at codemeta.com
Mon Jun 12 12:42:33 EDT 2017
I have to second this suggestion - changing the port did wonders for our
servers. Of course, as Dan says, it works for script kiddies, not so
much against a determined attack on your server.
--Bruce
On 06/12/2017 09:59 AM, Dan Garthwaite wrote:
> If you can change the port number it does wonders against the script
> kiddies.
>
> Just remember to add the new port, restart sshd, then remove the old
> port. :)
>
> On Sun, Jun 11, 2017 at 1:53 PM, Ted Roche <tedroche at gmail.com
> <mailto:tedroche at gmail.com>> wrote:
>
> Thanks, all for the recommendations. I hadn't seen sshguard before;
> I'll give that a try.
>
> I do have Fail2Ban in place, and have customized a number of scripts,
> mostly for Apache (trying to invoke asp scripts on my LAMP server
> results in instaban, for example) and it is what it reporting the ssh
> login failures.
>
> I have always seen them, in the 10 years I've had this server running,
> but the frequency, periodicity and international variety (usually
> they're all China, Russian, Romania) seemed like there might be
> something else going on.
>
> Be careful out there.
>
> On Sun, Jun 11, 2017 at 11:19 AM, Mark Komarinski
> <mkomarinski at wayga.org <mailto:mkomarinski at wayga.org>> wrote:
> > sshguard is really good since it'll drop in a iptables rule to
> block an IP
> > address after a number of attemps (and prevent knocking on other
> ports too).
> >
> > Yubikey as 2FA is pretty nice too.
> >
> > -------- Original message --------
> > From: Bruce Dawson <jbd at codemeta.com <mailto:jbd at codemeta.com>>
> > Date: 6/11/17 10:58 AM (GMT-05:00)
> > To: gnhlug-discuss at mail.gnhlug.org
> <mailto:gnhlug-discuss at mail.gnhlug.org>
> > Subject: Re: What's the strategy for bad guys guessing a few ssh
> passwords?
> >
> > sshguard takes care of most of them (especially the high
> bandwidth ones).
> >
> > The black hats don't care - they're looking for vulnerable
> systems. If
> > they find one, they'll exploit it (or not).
> >
> > Note that a while ago (more than a few years), comcast used to probe
> > systems to see if they're vulnerable. Either they don't do that any
> > more, or contract it out because I haven't see probes from any
> of their
> > systems in years. This probably holds true for other ISPs, and
> various
> > intelligence agencies in the world - both private and public, not to
> > mention various disreputable enterprises.
> >
> > --Bruce
> >
> >
> > On 06/11/2017 10:17 AM, Ted Roche wrote:
> >> For 36 hours now, one of my clients' servers has been logging ssh
> >> login attempts from around the world, low volume, persistent,
> but more
> >> frequent than usual. sshd is listening on a non-standard port,
> just to
> >> minimize the garbage in the logs.
> >>
> >> A couple of attempts is normal; we've seen that for years. But
> this is
> >> several each hour, and each hour an IP from a different country:
> >> Belgium, Korea, Switzerland, Bangladesh, France, China, Germany,
> >> Dallas, Greece. Usernames vary: root, mythtv, rheal, etc.
> >>
> >> There's several levels of defense in use: firewalls, intrusion
> >> detection, log monitoring, etc, so each script gets a few
> guesses and
> >> the IP is then rejected.
> >>
> >> In theory, the defenses should be sufficient, but I have a concern
> >> that I'm missing their strategy here. It's not a DDOS, they are
> very
> >> low volume. It will take them several millennia to guess enough
> >> dictionary attack guesses to get through, so what's the point?
> >>
> >
> > _______________________________________________
> > gnhlug-discuss mailing list
> > gnhlug-discuss at mail.gnhlug.org
> <mailto:gnhlug-discuss at mail.gnhlug.org>
> > http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/
> <http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/>
> >
> > _______________________________________________
> > gnhlug-discuss mailing list
> > gnhlug-discuss at mail.gnhlug.org
> <mailto:gnhlug-discuss at mail.gnhlug.org>
> > http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/
> <http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/>
> >
>
>
>
> --
> Ted Roche
> Ted Roche & Associates, LLC
> http://www.tedroche.com
> _______________________________________________
> gnhlug-discuss mailing list
> gnhlug-discuss at mail.gnhlug.org <mailto:gnhlug-discuss at mail.gnhlug.org>
> http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/
> <http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/>
>
>
>
>
> _______________________________________________
> gnhlug-discuss mailing list
> gnhlug-discuss at mail.gnhlug.org
> http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.gnhlug.org/pipermail/gnhlug-discuss/attachments/20170612/5b9a9f1b/attachment.html
More information about the gnhlug-discuss
mailing list