Re: Repeated attacks via SSH

看板FB_security作者時間20年前 (2005/10/03 19:49), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串15/23 (看更多)
Hello Brett, Monday, October 3, 2005, 12:01:26 AM, you wrote: > Everyone: > We're starting to see a rash of password guessing attacks via SSH > on all of our exposed BSD servers which are running an SSH daemon. > They're coming from multiple addresses, which makes us suspect that > they're being carried out by a network of "bots" rather than a single attacker. > But wait... there's more. The interesting thing about these attacks > is that the user IDs for which passwords are being guessed aren't > coming from a completely fixed list. Besides guessing at the > passwords for root, toor, news, admin, test, guest, webmaster, > sshd, and mysql, the bots are also trying to get into our mail > exchangers via user IDs which are the actual names of users for > whom the machines receive mail. In one case, we saw an attempt to > use the name of a user who hadn't been on for years but whose > address was published ONCE (according to Google and AltaVista) on > the Net. Since the attackers are not guessing at hundreds of > invalid user names, the only conclusion we can draw is that when > one of the bots attacks a mail server, it quickly tries to harvest > e-mail addresses from the server's domain from the Net and then > tries them, in the hope that those users (a) are enabled for SSH > and (b) have weak passwords. > SSH is enabled by default in most BSD-ish operating systems, and > this makes us a bigger target for these bots than users of OSes > that don't come with SSH (not that they're not more vulnerable in > other ways!). Therefore, it's strongly recommended that, where > practical, everyone limit SSH logins to the minimum possible number > of users via the "AllowUsers" directive. very nice is to use AllowUsers in form of user@host. > We also have a log monitor > that watches the logs (/var/log/auth.log in particular) and > blackholes hosts that seem to be trying to break in via SSH. I wrote a similar script. it's also in ports under security/bruteforceblocker > --Brett Glass -- Sincerely, Daniel Gerzo _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #13GHh300 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #13GHh300 (FB_security)