how to react on ssh attacks?

Stuart Sears stuart at sjsears.com
Mon Oct 24 12:04:18 UTC 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Stephanus Fengler wrote:
> Dear list readers,
> 
> I know that this is not a security list but it seems a good starting
> point for me as an ordinary user to ask whether someone can point me in
> the right direction.
> 
> I recently checked my log files of my ssh service (so far as I
> understand this is my only service open) and realized that from the very
> same IP I got a lot of request trying to guess a user name on my system,
> I assume. Since login name always changes in even chronological
> alphabetical order.
> 
> So shell I worry about it or do I need to do some countermeasures?

you have already received some excellent advice on this topic, but might
 I add the following:
these attacks will get more sophisticated as time goes on - the
usernames are just a dictionary based attack and eventually they may get
a username to work...
if you always ssh into your system from specific machines, you could
force the use of public-key authentication on your server, so that even
if the atttackers guess the correct passwords for your system, they will
be useless without the relevant private key on the attacking system...
just for personal security/peace of mind, I would also change the
Protocol 2,1 line in /etc/ssh/sshd_config to say Protocol 2 and then
restart the daemon as before. ssh protocol 1 has known exploits.


- --
Stuart Sears RHCE RHCX
printk("Penguin %d is stuck in the bottle.\n", i);
        linux-2.0.38/arch/sparc/kernel/smp.c
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFDXM3BamPtx1brPQ4RAuE6AJ408+4Tcaycr8VdNszEHNigMpDh/QCfVyM2
4xrXMZfXMLlknli3tNAzaus=
=A8hQ
-----END PGP SIGNATURE-----




More information about the fedora-list mailing list