From owner-freebsd-security@FreeBSD.ORG Mon Oct 3 13:49:47 2005 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id E30FC16A41F for ; Mon, 3 Oct 2005 13:49:47 +0000 (GMT) (envelope-from randy@psg.com) Received: from rip.psg.com (rip.psg.com [147.28.0.39]) by mx1.FreeBSD.org (Postfix) with ESMTP id 9A3BC43D46 for ; Mon, 3 Oct 2005 13:49:44 +0000 (GMT) (envelope-from randy@psg.com) Received: from localhost ([127.0.0.1] helo=roam.psg.com) by rip.psg.com with esmtp (Exim 4.52 (FreeBSD)) id 1EMQhL-0003zY-CK; Mon, 03 Oct 2005 13:49:43 +0000 Received: from localhost ([127.0.0.1] helo=roam.psg.com) by roam.psg.com with esmtp (Exim 4.52 (FreeBSD)) id 1EMQhF-0000SH-Qa; Mon, 03 Oct 2005 03:49:37 -1000 From: Randy Bush MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <17217.14065.212429.584572@roam.psg.com> Date: Mon, 3 Oct 2005 06:49:37 -0700 To: Brett Glass References: <6.2.3.4.2.20051002153930.07a50528@localhost> <1048266117.20051003001242@rulez.sk> <6.2.3.4.2.20051002162545.08f66558@localhost> Cc: freebsd-security@freebsd.org, Daniel Gerzo Subject: Re: Repeated attacks via SSH X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Oct 2005 13:49:48 -0000 > Of course, the problem is that if you need to get access in an > emergency from who-knows-where, you're pretty much stuck with > passwords unless you have a token system or a one time password > system (e.g. S/Key). (Which reminds me: Anyone have a good S/Key > implementation for the Palm Pilot?) sshv2 with keys for palm at . works great on my treo 650. if at all possible, just don't allow passwords the ssh root and dict attacks have been going on for long over a year. some days we see more than 25,000 per target host, occasionally 100,000. it's so common that i started to grep it out of log reports ages ago. randy