Author: T.Wennekers (10 May 08 9:38am)
Thanks again, Peter.
I am blocking ssh attacks since a couple of years and are aware of the general possibilities to do so, although over the last couple of days I found out that there have been quite a few recent developments, some of them mentioned in your message. (I would perhaps add pam_abl as a way different from the already mentioned ones).
My original motivation to start this thread, however, was to find out whether there exists some concerted attempt to address the ssh-attacks, similar to project honey pot for WWW, or blacklists (like spamcop) for smtp. Given simple configurations in the ssh protection systems you refer to in your message an attacker is typically blocked after >~3 failed attempts for a day. They can still do 1000 attempts per year per server. Given a bot-net the number multiplies. They can also do one attempt every 10 minutes or so and would probably not even be detected by many setups resulting in an even higher number of attempts possible. I just thought somebody could have set up something like "blacklists for ssh"? Beside its apparent usefulness for blacklisting, such a centralised data-base system might further have the potential to provide insight into the underlying bot-nets doing the attacks, thereby perhaps allowing to fight them better?
May that as it be, as you rightly pointed out project honeypot targets on the WWW port. Therefore the above is a bit off topic.
Best wishes
Thomas
|