[rescue] SSH functionality ::WAS::::::::Re: Sun V240

Jerry Kemp sun.mail.list47 at oryx.us
Wed Nov 1 15:06:43 CDT 2017


Hello David,

Thank you for the post.  I haven't looked at these directly, but I'm assuming 
that since you suggested them, that they work well, both with Solaris or 
Solaris-distro's, and work with OpenSSH.

Several years back, I explored quite a few of these SSH blocking/firewalling 
utilities.  My discovery, at the time, was that the vast majority of the ones I 
reviewed were written to interact only with the proprietary lunix built in 
firewall application.

Regarding the "match" functionality in current OpenSSH releases, I seem to 
recall looking at that, and not pursuing that further.  Can't remember as to why.

One of the things I liked about the denyhost application, was that it would both 
add entries to the /etc/hosts.deny file, which was very useful for when being 
hit by a dictionary attack very rapidly, but, also, I can set a timeout which 
would remove entries.  Helpful if you make multiple bad attempts and get 
yourself blocked from your own box.

Lionel,

Regarding observing remote root login attempts, regardless of root being 
disabled, it is just the fact they are occurring.  I would speculate that if you 
have just stuck your box out on the Internet, the (ssh) login attempts are 
probably low at the present.  I have a (Solaris) box that is in a COLO for more 
than a decade (upgraded several times), and I am just continually being hit by 
random & continual ssh remote login attempts.

Although I mostly use ssh keys, and not passwds, I'm a big believer in the Bob 
Beck method of managing administrative accounts.

<https://web.archive.org/web/20160310190935/http://archives.neohapsis.com/archives/openbsd/2005-03/2878.html>

My big concern is that, due to numbers of hits, that properly managing and 
addressing events that do end up logged.  I already mentioned that I use 
denyhost to limit dictionary attacks that hit hard and heavy.   It didn't take 
long to start wondering what credentials the script kiddies were using to 
attempt to log into my system.

To address that, I am using a utility called 'kippo'.  Here is some sample log 
output, and you can see that frequently, passwds are simple, although sometimes 
they can be long and complex.  Big fan of kippo.

.................................................
2017-11-01 15:00:02-0500 [SSHService ssh-userauth on 
HoneyPotTransport,70340,198.98.60.52] mother trying auth password
2017-11-01 15:00:02-0500 [SSHService ssh-userauth on 
HoneyPotTransport,70340,198.98.60.52] login attempt [mother/admin] failed
2017-11-01 15:00:03-0500 [-] mother failed auth password
2017-11-01 15:00:03-0500 [-] unauthorized login:
2017-11-01 15:00:03-0500 [SSHService ssh-userauth on 
HoneyPotTransport,70340,198.98.60.52] mother trying auth password
2017-11-01 15:00:03-0500 [SSHService ssh-userauth on 
HoneyPotTransport,70340,198.98.60.52] login attempt [mother/root] failed
2017-11-01 15:00:04-0500 [-] mother failed auth password
2017-11-01 15:00:04-0500 [-] unauthorized login:
2017-11-01 15:00:05-0500 [SSHService ssh-userauth on 
HoneyPotTransport,70340,198.98.60.52] mother trying auth password
2017-11-01 15:00:05-0500 [SSHService ssh-userauth on 
HoneyPotTransport,70340,198.98.60.52] login attempt [mother/ubnt] failed
2017-11-01 15:00:06-0500 [-] mother failed auth password
2017-11-01 15:00:06-0500 [-] unauthorized login:
2017-11-01 15:00:06-0500 [SSHService ssh-userauth on 
HoneyPotTransport,70340,198.98.60.52] mother trying auth password
2017-11-01 15:00:06-0500 [SSHService ssh-userauth on 
HoneyPotTransport,70340,198.98.60.52] login attempt [mother/user] failed
2017-11-01 15:00:07-0500 [-] mother failed auth password
2017-11-01 15:00:07-0500 [-] unauthorized login:
2017-11-01 15:00:07-0500 [HoneyPotTransport,70340,198.98.60.52] connection lost
.................................................

as I log and archive this stuff, I have literally thousands of passwd's to play 
with, for use in other security tool explorations.

enjoy,

Jerry




On 11/ 1/17 11:33 AM, David Brownlee wrote:

>
> I'm sure all the cool kids are using something like
> https://www.sshguard.net/ or blacklistd
> https://www.youtube.com/watch?v=fuuf8G28mjs anyway :)
>
> The rationale for dropping tcpwrappers was that it was a subset of
> OpenSSH's built in Match functionality, and dropped a dependency
> http://lists.mindrot.org/pipermail/openssh-unix-dev/2014-April/032497.html
> - I think someone even submitted a small patch back to trigger
> tcpwrappers from Match.
>
> and thankfully there are also other ssh client implementations which
> support sshv1 or similar to connect to older boxes :)
>
> David


More information about the rescue mailing list