Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 2 Oct 2005 22:44:13 +0000
From:      Marcin Jessa <lists@yazzy.org>
To:        Brett Glass <brett@lariat.org>
Cc:        freebsd-security@freebsd.org, flynn@energyhq.es.eu.org
Subject:   Re: Repeated attacks via SSH
Message-ID:  <20051002224413.0c39428e.lists@yazzy.org>
In-Reply-To: <6.2.3.4.2.20051002153930.07a50528@localhost>

index | next in thread | previous in thread | raw e-mail

On Sun, 02 Oct 2005 16:01:26 -0600
Brett Glass <brett@lariat.org> wrote:

: Everyone:
: 
: We're starting to see a rash of password guessing attacks via SSH 
: on all of our exposed BSD servers which are running an SSH daemon. 
: They're coming from multiple addresses, which makes us suspect that 
: they're being carried out by a network of "bots" rather than a single
attacker. : 
: But wait... there's more. The interesting thing about these attacks 
: is that the user IDs for which passwords are being guessed aren't 
: coming from a completely fixed list. Besides guessing at the 
: passwords for root, toor, news, admin, test, guest, webmaster, 
: sshd, and mysql, the bots are also trying to get into our mail 
: exchangers via user IDs which are the actual names of users for 
: whom the machines receive mail. In one case, we saw an attempt to 
: use the name of a user who hadn't been on for years but whose 
: address was published ONCE (according to Google and AltaVista) on 
: the Net. Since the attackers are not guessing at hundreds of 
: invalid user names, the only conclusion we can draw is that when 
: one of the bots attacks a mail server, it quickly tries to harvest 
: e-mail addresses from the server's domain from the Net and then 
: tries them, in the hope that those users (a) are enabled for SSH 
: and (b) have weak passwords.
: 
: SSH is enabled by default in most BSD-ish operating systems, and 
: this makes us a bigger target for these bots than users of OSes 
: that don't come with SSH (not that they're not more vulnerable in 
: other ways!). Therefore, it's strongly recommended that, where 
: practical, everyone limit SSH logins to the minimum possible number 
: of users via the "AllowUsers" directive. We also have a log monitor 
: that watches the logs (/var/log/auth.log in particular) and 
: blackholes hosts that seem to be trying to break in via SSH.
: 

Great email Brett, this is ineed a true revelation we all at
freebsd-security@ have been waiting for.
B.T.W, did you also notice they harvest email addresses and send you
useless information about products you don't need?
I shit you not.
One needs to be carefull since SMTP servers are avaliable by default in
most BSD-ish operating systems, and this makes us a bigger target for
these email bots than users of OSes that don't come with SMTP (not that
they're not more vulnerable in other ways!). 


Cheers,
Marcin.




home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20051002224413.0c39428e.lists>