NetBSD-Users archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: ssh scans

I don't accept passwords at all, only public/private key authentication.
Just make sure that you have a /home/user/.ssh/authorized_keys2 file and
put this in /etc/ssh/sshd_config

Protocol 2
LoginGraceTime 600
PermitRootLogin no
StrictModes yes
RSAAuthentication no
PubkeyAuthentication yes
AuthorizedKeysFile      .ssh/authorized_keys2
RhostsRSAAuthentication no
HostbasedAuthentication no
PasswordAuthentication no
PermitEmptyPasswords no
ChallengeResponseAuthentication no
UsePam no
UseDNS no
Subsystem       sftp    /usr/libexec/sftp-server

and restart ssh of course.

the attacker will probably not even be able to negotiate an
authentication method and I don't think that gets logged.

The downside is that you can't log in without a key file but I just keep
a copy on the memory of my mobile phone which I can easily transfer to a
client PC if I need to use someone elses computer to log in.

regards, Philip

Rhialto wrote:
> On Mon 26 Oct 2009 at 12:42:57 -0700, David Wetzel wrote:
>> Hi,
>> I am seeing a lot of ssh scans and I am wondering if somebody has a  
>> solution like adding the bad hosts temporary to pf.conf or so?
> I use pam_af, which hooks into PAM. It is in pkgsrc: security/pam-af.
> It blocks IP addresses that try (and fail) more than N logins in M
> seconds for O time.
> The bad guys try to get around this, however. I have seen login attempts
> with fairly consistent interval from all kinds of different sources.
> That clearly was coordinated, since the interval alwas was between 1 and
> 3 minutes.
> I wish sshd would log passwords in these cases. I'm quite interested in
> knowing which passwords they try.
> -Olaf.

Home | Main Index | Thread Index | Old Index