Linux Security Experts

TonyRic

Golden Member
Nov 4, 1999
1,972
0
71
It is a great idea for organizations and the truly paranoid. But more security is never a bad idea.
 

Skeeedunt

Platinum Member
Oct 7, 2005
2,777
3
76
Seems like a fine idea, thought I wonder how often it really comes up. I see plenty of drive-by attacks in the logs, but never noticed a genuine brute-force attempt. Probably depends on who/where you are.

If you really wanted to get serious though, wouldn't you just disable password authentication altogether and use public key authentication?

(Disclaimer: not a Linux security expert )
 

Netopia

Diamond Member
Oct 9, 1999
4,793
4
81
Perhaps I should look into using PKA, but I like the idea of me being able to log in from anywhere I have ssh available, and PKA would pretty much kill that.

Joe
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
The idea in the article isn't a bad one but it only covers port 22 and you'd need one set of rules per port that you want to protect, unless you don't mind them all sharing the same timing pool. If you have strong enough passwords or PKA the main advantage to those rules would be cleaner logs.

Perhaps I should look into using PKA, but I like the idea of me being able to log in from anywhere I have ssh available, and PKA would pretty much kill that.

PKA wouldn't kill that if you just carried around a flash drive with your key on it.
 

child of wonder

Diamond Member
Aug 31, 2006
8,307
176
106
While working at an ISP we saw lots of brute force attacks in the logs. We ended up installing denyhosts. Basically if someone attempts an SSH log in and gets it wrong 5 times (or whatever number you set) their IP gets added to /etc/hosts.deny to block them from SSH access (or ANY access if you want).

We'd have betting pools on how many new IPs would get added over the weekends sometimes.
 

skyking

Lifer
Nov 21, 2001
22,631
5,740
146
I employ strong passwords, no root login, and used keys for any automated operations.
Since I don't run SSH servers for anyone else's convenience, I use a nonstandard port.
since the port change, my logs have no failed login attempts save my own ham-fisted ones.
 

DaiShan

Diamond Member
Jul 5, 2001
9,617
1
0
I use a perl script called sshblack that monitors my auth logs for failures, if three failures are detected from an ip address, an iptables rule is added to drop all packets from that IP address for 3 days. The other option is to use multifactor auth (something you have AND something you know) It is also good practice to disable root logins over ssh (PermitRootLogin no) that way an attacker would have to guess the user AND the password instead of just the password
 

DaiShan

Diamond Member
Jul 5, 2001
9,617
1
0
Originally posted by: child of wonder
While working at an ISP we saw lots of brute force attacks in the logs. We ended up installing denyhosts. Basically if someone attempts an SSH log in and gets it wrong 5 times (or whatever number you set) their IP gets added to /etc/hosts.deny to block them from SSH access (or ANY access if you want).

We'd have betting pools on how many new IPs would get added over the weekends sometimes.

/etc/hosts.deny only applies to services that are run through inetd (or xinetd) usually ssh is run as a daemon by init so adding rules to /etc/hosts.deny won't do much for you.

Also Netopia, the key on the USB is a great idea and true multi-factor authentication (a sox requirement for remote access) and not difficult to set up!
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
/etc/hosts.deny only applies to services that are run through inetd (or xinetd) usually ssh is run as a daemon by init so adding rules to /etc/hosts.deny won't do much for you.

That's not true at all, anything linked against TCP wrappers (libwrap) uses /etc/hosts.*.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |