From: Wakko Warner <wakko@animx.eu.org>
To: Dominic Caputo <jec6jec6@gmail.com>
Cc: netfilter@lists.netfilter.org
Subject: Re: SSHBrute Force: False Postives
Date: Thu, 1 Feb 2007 07:06:48 -0500 [thread overview]
Message-ID: <20070201120648.GA19604@animx.eu.org> (raw)
In-Reply-To: <02a601c745a8$9f7e1110$2904b00a@au.schpac.local>
Dominic Caputo wrote:
> I have been reading up on iptables and i am by no means an expert but i
> have a problem with SSH brute force attacks on port 22. I am currently
> using the config below to minimise these threats but i am constantly
> getting false positives (logs actually say that my connection has been
> flagged as a brute force connection even on the on the first attempt-but
> then on others it connects first time with no problems)
>
> #SSH Brute-Force Scan Check
> $IPTABLES -N SSH_Brute_Force
> $IPTABLES -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --name
> SSH --set --rsource -j SSH_Brute_Force
> $IPTABLES -A SSH_Brute_Force -m recent ! --rcheck --seconds 60 --hitcount
> 4 --name SSH --rsource -j ACCEPT
> $IPTABLES -A SSH_Brute_Force -j LOG --log-level info --log-prefix "SSH
> Brute Force Attempt: "
> $IPTABLES -A SSH_Brute_Force -p tcp -j DROP
>
> Any help with this problem would be great
I do it a little differently:
I have a chain called "internet" which is basically jumped to from INPUT and
FORWARD if the card it came in on is the one facing the internet. Prepend
iptables to the following lines (I still use iptables-restore)
-A internet -j ACCEPT -m conntrack --ctstate ESTABLISHED
... <other rules>
-A internet -j REJECT -m recent --update --seconds 600 --reject-with icmp-admin-prohibited
... <other rules>
-A internet -j ACCEPT -p tcp -m limit --limit 5/min --dport 22
-A internet -j LOG -p tcp --dport 22 --log-prefix "SSH FLOOD:"
-A internet -j REJECT -p tcp -m recent --set --dport 22 --reject-with icmp-admin-prohibited
This allows 5 new connections to port 22 in a minute. After which, that
rule no longer matches and goes to the next rule. Then the packet is logged
once and then the recent module is updated with the perpetrator's IP and the
2nd rule above catche it. They have to be quiet for 10 minutes before they
are allowed to attempt again.
This works very well for me since I don't have many people sshing into me
that often. I went from ~1000 lines in my logs to about 30.
I also add IPs when someone connects to various other ports that are common
attacks so I would probably never see an SSH attack from them.
--
Lab tests show that use of micro$oft causes cancer in lab animals
Got Gas???
next prev parent reply other threads:[~2007-02-01 12:06 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-02-01 2:28 SSHBrute Force: False Postives Dominic Caputo
2007-02-01 12:06 ` Wakko Warner [this message]
[not found] ` <20070201131319.71585.qmail@web25512.mail.ukl.yahoo.com>
2007-02-01 23:17 ` Wakko Warner
2007-02-02 14:38 ` Michael Rash
2007-02-02 17:26 ` Wakko Warner
2007-02-02 20:39 ` franck
2007-02-01 16:32 ` fender
2007-02-01 21:30 ` Brad Lhotsky
2007-02-06 20:53 ` R. DuFresne
2007-02-06 21:12 ` franck
2007-02-07 2:01 ` Michael Rash
2007-02-08 3:17 ` fender
2007-02-09 0:17 ` Michael Rash
2007-02-12 13:10 ` fender
-- strict thread matches above, loose matches on Subject: below --
2007-02-01 1:28 Lpct
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20070201120648.GA19604@animx.eu.org \
--to=wakko@animx.eu.org \
--cc=jec6jec6@gmail.com \
--cc=netfilter@lists.netfilter.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.