All of lore.kernel.org
 help / color / mirror / Atom feed
* Re: SSHBrute Force: False Postives
@ 2007-02-01  1:28 Lpct
  0 siblings, 0 replies; 15+ messages in thread
From: Lpct @ 2007-02-01  1:28 UTC (permalink / raw)
  To: netfilter

--------- Mensagem Original --------
De: Dominic Caputo <jec6jec6@gmail.com>
Para: netfilter@lists.netfilter.org <netfilter@lists.netfilter.org>
Asunto: SSHBrute Force: False Postives
Fecha: 01/02/07 02:30

>
> I have been reading up on iptables and i am by no means an expert but i
have
> a problem with SSH brute force attacks on port 22. I am currently using
the
> config below to minimise these threats but i am constantly getting false
> positives (logs actually say that my connection has been flagged as a
brute
> force connection even on the on the first attempt-but then on others it
> connects first time with no problems)
>
> #SSH Brute-Force Scan Check
> $IPTABLES -N SSH_Brute_Force
> $IPTABLES -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --name
> SSH --set --rsource -j SSH_Brute_Force
> $IPTABLES -A SSH_Brute_Force -m recent ! --rcheck --seconds 60 --hitcount
> 4 --name SSH --rsource -j ACCEPT
> $IPTABLES -A SSH_Brute_Force -j LOG --log-level info --log-prefix
&quot;SSH Brute
> Force Attempt:  &quot;
> $IPTABLES -A SSH_Brute_Force -p tcp -j DROP
>
> Any help with this problem would be great
>
> Dominic
>
.... you can start changing the ssh port from 22 to xxx... this doesnt solve
your problem, but this mesure minimize this kind of attack like a 70%
________________________________________________
linux.pctools.cl



^ permalink raw reply	[flat|nested] 15+ messages in thread
* SSHBrute Force: False Postives
@ 2007-02-01  2:28 Dominic Caputo
  2007-02-01 12:06 ` Wakko Warner
  2007-02-01 16:32 ` fender
  0 siblings, 2 replies; 15+ messages in thread
From: Dominic Caputo @ 2007-02-01  2:28 UTC (permalink / raw)
  To: netfilter

I have been reading up on iptables and i am by no means an expert but i have 
a problem with SSH brute force attacks on port 22. I am currently using the 
config below to minimise these threats but i am constantly getting false 
positives (logs actually say that my connection has been flagged as a brute 
force connection even on the on the first attempt-but then on others it 
connects first time with no problems)

#SSH Brute-Force Scan Check
$IPTABLES -N SSH_Brute_Force
$IPTABLES -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --name 
SSH --set --rsource -j SSH_Brute_Force
$IPTABLES -A SSH_Brute_Force -m recent ! --rcheck --seconds 60 --hitcount 
4 --name SSH --rsource -j ACCEPT
$IPTABLES -A SSH_Brute_Force -j LOG --log-level info --log-prefix "SSH Brute 
Force Attempt:  "
$IPTABLES -A SSH_Brute_Force -p tcp -j DROP

Any help with this problem would be great

Dominic



^ permalink raw reply	[flat|nested] 15+ messages in thread

end of thread, other threads:[~2007-02-12 13:10 UTC | newest]

Thread overview: 15+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-02-01  1:28 SSHBrute Force: False Postives Lpct
  -- strict thread matches above, loose matches on Subject: below --
2007-02-01  2:28 Dominic Caputo
2007-02-01 12:06 ` Wakko Warner
     [not found]   ` <20070201131319.71585.qmail@web25512.mail.ukl.yahoo.com>
2007-02-01 23:17     ` Wakko Warner
2007-02-02 14:38       ` Michael Rash
2007-02-02 17:26         ` Wakko Warner
2007-02-02 20:39           ` franck
2007-02-01 16:32 ` fender
2007-02-01 21:30   ` Brad Lhotsky
2007-02-06 20:53   ` R. DuFresne
2007-02-06 21:12     ` franck
2007-02-07  2:01     ` Michael Rash
2007-02-08  3:17       ` fender
2007-02-09  0:17         ` Michael Rash
2007-02-12 13:10           ` fender

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.