public inbox for gentoo-user@lists.gentoo.org
 help / color / mirror / Atom feed
From: Steve <Gentoo_sjh@shic.co.uk>
To: gentoo-user@lists.gentoo.org
Subject: Re: [gentoo-user] Curious pattern in log files from ssh...
Date: Fri, 05 Dec 2008 11:24:34 +0000	[thread overview]
Message-ID: <49390F72.20406@shic.co.uk> (raw)
In-Reply-To: <200812042320.12159.alan.mckinnon@gmail.com>

Alan McKinnon wrote:
> On Thursday 04 December 2008 21:03:17 Christian Franke wrote:
>   
>> I just don't see what blocking ssh-bruteforce attempts should be good
>> for, at least on a server where few _users_ are active.
>>     
> Two reasons:
>
> a. Maybe, just maybe, you overlooked something. Belts, braces and a drawstring 
> for good measure is not a bad thing.
>
> b. You probably want to get all that crap out of your log files off into some 
> other place where you can cope with it. Parsing auth log files that are 95% 
> brute force attempts is no fun. I like to have the crap in place A and the 
> real stuff in place B, makes my job so much easier
>   
I agree 100% with the above - another issue is that I'd like to block
all traffic from malicious hosts - I realise that the traffic is low at
the moment, but that need not be the case in future.
>> Also, things like fail2ban add new attack-possibilities to a system, I
>> remember the old DoS for fail2ban, resulting from a wrong regex in log
>> file parsing, but I think at least this is fixed now.
>>     
> Whereas that is true enough in itself, the actual risk of such is rather low 
> in comparison to the gains. Hence it is not a valid reason to not use 
> fail2ban and such-like apps.
The issue for me is that the cost of a DOS is far, far lower than the
cost of a break-in.  The cost of a DOS that prevents access from new
hosts is orders of magnitude lower than the cost of a DOS.  Everyone's
risk profiles are different - but, for me, keeping out intruders is
critical (they may result in unrecoverable data loss) and my
accessibility objective is that it be the 'norm' that I can log in with
an unusual-username and complex password from a trustworthy PC whose IP
address can not be determined in advance... using only bog-standard
tools and no non-remembered personal data.

I'm coming around to the idea of port-knocking, but my gut instinct is
that it is a bit baroque and has potential for me to louse-up its
implementation... It definitely adversely affects usability - though, I
admit, less than I first suspected.  I'm still quite interested in the
idea of identifying botnets where used to subvert the tactics used by
fail2ban; blacklist.py, etc. and using these to, in turn, block access
to any service... including, for example, hosted web-services which are,
potentially, in spite of taking all the obvious precautions, more
vulnerable to attack - IMHO.

I'm definitely thinking that it would be a good idea if there were a way
to publish botnet lists... such that they could be collated and turned
into a DNSBL style resource.  If such a resource existed, I'd definitely
chose to use it (overridden by a few whitelist entries of my own -
just-in-case...) and I'd be very happy to report back to it in order to
help keeping this problem under control.  Incidentally, I'd also
consider it useful to monitor this block list for any occurrence of my
own IP address - since that would be an early indication that one of my
hosts may be compromised.







      reply	other threads:[~2008-12-05 11:24 UTC|newest]

Thread overview: 33+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-12-03 20:02 [gentoo-user] Curious pattern in log files from ssh Steve
2008-12-03 20:16 ` [gentoo-user] " Nikos Chantziaras
2008-12-03 20:19   ` Paul Hartman
2008-12-03 20:52     ` Nikos Chantziaras
2008-12-03 20:17 ` [gentoo-user] " Albert Hopkins
2008-12-03 20:18 ` Paul Hartman
2008-12-03 20:49 ` Simon
2008-12-04 11:31   ` Steve
2008-12-05  7:16     ` Mick
2008-12-03 20:54 ` Alan McKinnon
2008-12-03 21:03 ` Dmitry S. Makovey
2008-12-03 21:47   ` Steve
2008-12-03 22:11     ` Dmitry S. Makovey
2008-12-03 22:55       ` Steve
2008-12-03 23:21         ` Paul Hartman
2008-12-03 23:46           ` Dmitry S. Makovey
2008-12-03 23:55           ` Steve
2008-12-04  0:07             ` Dmitry S. Makovey
2008-12-04  0:39               ` Steve
2008-12-04 15:50                 ` Dmitry S. Makovey
2008-12-04 22:44                   ` Adam Carter
2008-12-05  0:15                     ` Dmitry S. Makovey
2008-12-04 23:42                   ` Shawn Haggett
2008-12-03 22:54     ` Adam Carter
2008-12-04 11:24 ` Evgeniy Bushkov
2008-12-04 22:41   ` Adam Carter
2008-12-04 22:53     ` Adam Carter
2008-12-05 15:05     ` Evgeniy Bushkov
2008-12-07  5:52       ` Joshua Murphy
2008-12-04 19:03 ` Christian Franke
2008-12-04 20:22   ` Dmitry S. Makovey
2008-12-04 21:20   ` Alan McKinnon
2008-12-05 11:24     ` Steve [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=49390F72.20406@shic.co.uk \
    --to=gentoo_sjh@shic.co.uk \
    --cc=gentoo-user@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox