-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Mon, 13 Jun 2005, Taylor, Grant wrote:
Sadus . wrote:
Portsentry listens to a set of ports you set. when someone nmaps your
machine or do some kind of scanning on certain ports, portsentry blocks
that IP via the method you prefer (ipchain, iptables...) and it can echo
the IP to /etc/hosts.deny thus droping all connections with the
attacker. I want to expand the SSH Brute force script to enable this
feature.
It is not important to know if an IP is already in the /etc/hosts.deny
list because since the IP is droped and denied from accessing, the IP
won't reach the brute force script, so normaly you won't have repetition
of IPs.
I'm working on a re-write of the SSH_Brute_Force chain on my home firewall. This rewrite will be VERY different and should be the foundation for much growth and adaptation in to other things as well. The basic idea behind it is to use a multi level triggering system. Restated in english if you trigger the first level you are banned for a specific amount of time. If you trip the first level and are banned for the specified amount of chem and then re trip the first level you are then banned at the second level and banned for a longer time. At present my levels are as follows, 1 minute, 1 hour, 1 day, 1 week, 1 month, 1 year and then permanent ban. I'm also adding IPs to a recent list that can be checked by other chains early on in the chain set out side of the SSH_Brute_Force chain. Needless to say it's very complex and I'm doing some testing to make sure that it works the way that I want it to. Once I get it working I'll either post it to this thread or start a new !
one
with an appropriate subject. I'm trying to include some functionality or the capability of the functionality of Portsentry as you have requested.
I'm not sure if /etc/hosts.deny will prevent packets from entering IPTables or not as I thought that the file was read by user space daemons as a list of IPs to never talk to, not necissarly to the IP table to deny access to. I could be wrong on this though.
if tcpd is enabled for the service inquestion <and most sshd's are tcpd
compliant as well as some sendmails on some dists now> then yes, this will
prevent the packets from reaching iptables or the system as a whole. Took
me awhile once to figure out what was getting hit first, and it appears
that tpd picks up prior to iptables, though, it does not really matter
about order, if either is set to drop, reject, not accept the packet then
the packet will nat make it to the application layer. Another show
stopper and the main point of where this control rests and shoud rest and
be configg'ed for sshd is the sshd_conf file. One can limit sshd such
that once a bad passwd is presented the connection drop and the other end
has to start from scratch. One can also place in limits as to whait
hosts/IP's are allowed to conenct to the sshd on the server. the main
control for an application should reside in that applications control
mechinisms whereeve possible. this does not mean that one can not also
the place in other mechnics to take up if the main controling mechinism
fails, but, let the app, if it is capable control it;s own. From there
laye in the rest of the security layers one is shimming into the mix.
Remember if there is a /etc/hosts.deny, there should also be a
/etc/hosts.allow, the deny should be a default deny all, the allow should
place limits.
Thanks,
Ron DuFresne
- --
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
admin & senior security consultant: sysinfo.com
http://sysinfo.com
Key fingerprint = 9401 4B13 B918 164C 647A E838 B2DF AFCC 94B0 6629
...We waste time looking for the perfect lover
instead of creating the perfect love.
-Tom Robbins <Still Life With Woodpecker>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFCrde5st+vzJSwZikRAry6AKCbAQ61tcdWUoaIG/FiZuz6i5WzgwCgsQK8
DIH2EtBl0SPjFbVMvQEkbOE=
=cOl+
-----END PGP SIGNATURE-----