Re: SSH Brute force attacks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



How efficient is recent, I currently scan my log files for 'evil'
activity and build up a list of around 2000s ip addresses which I place
into a BLOCKED chain, there is about 2 lines per entry cause I TARPIT
tcp sessions.  But I could more easily manage it with recent as I can
just use the test of are they in the list !

I am presuming it is more efficient to use recent cause it hashes the
address ! can any one confirm this ?

A

On Sun, May 08, 2005 at 02:51:24PM -0400, Dwayne Hottinger wrote:
> Cool.  Ive been having the same issue for quite some time.  Im going to look
> hard at this.
> 
> ddh
> 
> 
> Quoting Alistair Tonner <Alistair@xxxxxxxxxx>:
> 
> > On May 7, 2005 01:32 am, Taylor, Grant wrote:
> > > > One one of my hosted boxes, my logwatch scripts continuously pipe out my
> > > > ssh and auth log of unsuccessful dictionary attacks
> > > >
> > > > I came across this link : http://blog.andrew.net.au/2005/02/17/
> > >
> > > Not a bad idea, but I think there is a little bit of room for growth.
> >
> >
> > 	Grant:
> > 		I think you've put together the basis for a FAQ on recent/TARPIT here --
> > and
> > I like yer attitude *grin*
> >
> > 	Oskar A:
> >
> > 		If you'd like I can buff the following up some, but I think this deserves a
> > mention in the iptables tutorial:
> >
> > >
> > > # Let's jump to the SSH_Brute_Force chain if this is a new connection that
> > > is not from my IP address. # This will prevent processing these rules for
> > > non SSH traffic.
> > > iptables -A INPUT -p tcp --dport 22 -m state --state NEW -j SSH_Brute_Force
> > > # Let's white list some IP addresses.
> > > iptables -A SSH_Brute_Force -s $My_IP_Address -j RETURN
> > > iptables -A SSH_Brute_Force -s $My_Friends_IP_Address -j RETURN
> > > iptables -A SSH_Brute_Force -s $Any_other_IP_that_I_want_to_white list -j
> > > RETURN # If there have not been 4 NEW connection attempts from this source
> > > IP address in the last 60 seconds let's return to the INPUT chain. iptables
> > > -A SSH_Brute_Force -m recent --name SSH ! --rcheck --seconds 60 -m recent
> > > --hitcount 4 --set --name SSH -j RETURN # Well, the NEW connection has been
> > > seen so let's update the SSH recent list. iptables -A SSH_Brute_Force -m
> > > recent --name SSH --update
> > > # I like to log on a line by it's self so I don't have to remember to do it
> > > on my last line prior to the end of my script. iptables -A SSH_Brute_Force
> > > -j LOG --log-prefix "SSH Brute Force Attempt:  " # Let's send the person
> > > that is trying to SSH in to us to the TARPIT target and make them think
> > > twice before they try again. # TARPIT will force the site that is SSHing in
> > > to us to timeout the connection.  Sure stick you hand in my port, I'll grab
> > > hold of it and not let go, # you will have to chew your arm off and grow a
> > > new one and try again.  I'll hold your new arm again and again and again
> > > and...  This should slow you down. iptables -A SSH_Brute_Force -j TARPIT
> > > # I can be a mean vindictive SoB (Sweet Old Buzzard.  NOT!)
> >
> > 	I like that in an admin. *grin*
> >
> > 	Alistair Tonner
> > >
> > > I tried putting in comments to explain the logic of what is going on, if
> > > you have any questions please let me know.
> > >
> > >
> > >
> > > Grant. . . .
> >
> 
> 
> --
> Dwayne Hottinger
> Network Administrator
> Harrisonburg City Public Schools
> 
> 

Attachment: signature.asc
Description: Digital signature


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux