You can subscribe to this list here.
| 2007 |
Jan
|
Feb
|
Mar
(10) |
Apr
(7) |
May
(6) |
Jun
(13) |
Jul
(4) |
Aug
|
Sep
|
Oct
(17) |
Nov
(5) |
Dec
(4) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2008 |
Jan
(2) |
Feb
|
Mar
|
Apr
(4) |
May
(2) |
Jun
(7) |
Jul
(10) |
Aug
(4) |
Sep
(14) |
Oct
|
Nov
(1) |
Dec
(7) |
| 2009 |
Jan
(17) |
Feb
(20) |
Mar
(11) |
Apr
(14) |
May
(8) |
Jun
(3) |
Jul
(22) |
Aug
(9) |
Sep
(8) |
Oct
(6) |
Nov
(4) |
Dec
(8) |
| 2010 |
Jan
(17) |
Feb
(9) |
Mar
(15) |
Apr
(24) |
May
(14) |
Jun
(1) |
Jul
(21) |
Aug
(6) |
Sep
(2) |
Oct
(2) |
Nov
(6) |
Dec
(9) |
| 2011 |
Jan
(11) |
Feb
(1) |
Mar
(3) |
Apr
(4) |
May
|
Jun
|
Jul
(2) |
Aug
(3) |
Sep
(2) |
Oct
(29) |
Nov
(1) |
Dec
(1) |
| 2012 |
Jan
(1) |
Feb
(1) |
Mar
|
Apr
(13) |
May
(4) |
Jun
(9) |
Jul
(2) |
Aug
(2) |
Sep
(1) |
Oct
(2) |
Nov
(11) |
Dec
(4) |
| 2013 |
Jan
(2) |
Feb
(2) |
Mar
(4) |
Apr
(13) |
May
(4) |
Jun
|
Jul
|
Aug
(1) |
Sep
(5) |
Oct
(3) |
Nov
(1) |
Dec
(3) |
| 2014 |
Jan
|
Feb
(3) |
Mar
(3) |
Apr
(6) |
May
(8) |
Jun
|
Jul
|
Aug
(1) |
Sep
(1) |
Oct
(3) |
Nov
(14) |
Dec
(8) |
| 2015 |
Jan
(16) |
Feb
(30) |
Mar
(20) |
Apr
(5) |
May
(33) |
Jun
(11) |
Jul
(15) |
Aug
(91) |
Sep
(23) |
Oct
(10) |
Nov
(7) |
Dec
(9) |
| 2016 |
Jan
(22) |
Feb
(8) |
Mar
(6) |
Apr
(23) |
May
(38) |
Jun
(29) |
Jul
(43) |
Aug
(43) |
Sep
(18) |
Oct
(8) |
Nov
(2) |
Dec
(25) |
| 2017 |
Jan
(38) |
Feb
(3) |
Mar
(1) |
Apr
|
May
(18) |
Jun
(2) |
Jul
(16) |
Aug
(2) |
Sep
|
Oct
(1) |
Nov
(4) |
Dec
(14) |
| 2018 |
Jan
(15) |
Feb
(2) |
Mar
(3) |
Apr
(5) |
May
(8) |
Jun
(12) |
Jul
(19) |
Aug
(16) |
Sep
(8) |
Oct
(13) |
Nov
(15) |
Dec
(10) |
| 2019 |
Jan
(9) |
Feb
(3) |
Mar
|
Apr
(2) |
May
|
Jun
(1) |
Jul
|
Aug
(5) |
Sep
(5) |
Oct
(12) |
Nov
(4) |
Dec
|
| 2020 |
Jan
(2) |
Feb
(6) |
Mar
|
Apr
|
May
(11) |
Jun
(1) |
Jul
(3) |
Aug
(22) |
Sep
(8) |
Oct
|
Nov
(2) |
Dec
|
| 2021 |
Jan
(7) |
Feb
|
Mar
(19) |
Apr
|
May
(10) |
Jun
(5) |
Jul
(7) |
Aug
(3) |
Sep
(1) |
Oct
|
Nov
(10) |
Dec
(4) |
| 2022 |
Jan
(17) |
Feb
|
Mar
(7) |
Apr
(3) |
May
|
Jun
(1) |
Jul
(3) |
Aug
|
Sep
|
Oct
(6) |
Nov
|
Dec
|
| 2023 |
Jan
|
Feb
(5) |
Mar
(1) |
Apr
(3) |
May
|
Jun
(3) |
Jul
(2) |
Aug
|
Sep
|
Oct
|
Nov
(6) |
Dec
|
| 2024 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(3) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| 2025 |
Jan
|
Feb
|
Mar
(15) |
Apr
(8) |
May
(10) |
Jun
|
Jul
|
Aug
|
Sep
(6) |
Oct
|
Nov
|
Dec
|
|
From: Jim T. <jt...@gm...> - 2009-05-29 13:01:05
|
sshguard 1.4rc4 is happily running on my Mac OS X Server 10.5.7. My previous experience with it not blocking was simply because I hadn't started the firewall service in Server Admin! Remember to compile --with-firewall=ipfw --with-firewall-rule-range=11000-11999 (or whatever, just get under the allow rule that Server Admin will set at 12302 for ssh) tail -n0 -F /var/log/secure.log | /usr/local/sbin/sshguard My next step is to create a system LaunchDaemon for this so on reboot my server is still protected. I'll post the contents of that plist when done. Thanks for sshguard! |
|
From: Jim T. <jt...@gm...> - 2009-05-26 22:55:14
|
I downloaded the 1.4rc4, compiled it with the IPFW option and set the rule range to 11000-11999, make'd and make installed with no problems. I used the tail | sshguard method and tested with an invalid username and garbage password. Sure enough, sshguard generated an IPFW rule blocking the computer I was coming from (192.168.0.198). services:~ me: sudo ipfw list Password: 01000 allow ip from any to any via lo0 01010 deny ip from any to 127.0.0.0/8 01020 deny ip from 224.0.0.0/4 to any in 01030 deny tcp from any to 224.0.0.0/4 in 11136 deny ip from 192.168.0.198 to me 12300 allow tcp from any to any established 12301 allow tcp from any to any out 12302 allow tcp from any to any dst-port 22 12302 allow udp from any to any dst-port 22 12303 allow udp from any to any out keep-state 12304 allow tcp from any to any dst-port 53 out keep-state 12304 allow udp from any to any dst-port 53 out keep-state 12305 allow udp from any to any in frag 12306 allow tcp from any to any dst-port 311 12307 allow tcp from any to any dst-port 625 12308 allow udp from any to any dst-port 626 12309 allow icmp from any to any icmptypes 8 12310 allow icmp from any to any icmptypes 0 12311 allow igmp from any to any 65534 deny ip from any to any 65535 allow ip from any to any But oddly, the firewall is not blocking access from that computer (I can pull up the web page hosted by the server, continue to ssh, etc) I'm suspecting the "me" token is being misinterpreted by the version of IPFW running here. Can anyone else share their experiences with sshguard on OS X Server? |
|
From: Peter B. <be...@an...> - 2009-05-26 14:50:32
|
On Sat, 9 May 2009, David Horn wrote:
> Anyone on this list have access to a OSX 10.5 dev environment that is
> willing to test some patches ?
Looks like it works:
(4 tries, debugging match stuff cut)...
Matched address 2001:db8::1:6 attacking service 100
Blocking 2001:db8::1:6 for >420secs: 4 failures over 8 seconds.
Running command: '/sbin/ip6fw add 55038 drop ipv6 from 2001:db8::1 to any'.
55038 deny ipv6 from 2001:db8::1 to any
Command exited 0.
First sight of offender '2001:db8::1:6', adding to offenders list.
Thanks for the patches David! Compiled on 10.5.7 Mac Pro.
Beckman
PS -- Is the webmaster position still open Mij? I think I emailed you
about it but never heard back.
---------------------------------------------------------------------------
Peter Beckman Internet Guy
be...@an... http://www.angryox.com/
---------------------------------------------------------------------------
|
|
From: Mij <mi...@bi...> - 2009-05-25 21:49:15
|
thanks for your contribution. Any Mac user around who can contribute a few testing? If not, I will have a look at this in some weeks. On May 9, 2009, at 17:20 , David Horn wrote: > Anyone on this list have access to a OSX 10.5 dev environment that is > willing to test some patches ? > > I have a patch for ipfw firewall and ipv6 that I have tested on > FreeBSD 7, and OSX (ppc) 10.4, but I would prefer someone test with > OSX 10.5 or even snow leopard (intel or ppc) as well. > > 1) Get base code here: > svn co https://sshguard.svn.sourceforge.net/svnroot/sshguard > sshguard > > 2) Get the patches (both) of them from here: (save to the > sshguard/trunk directory from step 1) > https://sourceforge.net/tracker/?func=detail&aid=2777559&group_id=188282&atid=924687 > > 3) Apply patches and configure/build > > su root > cd sshguard/trunk > patch <osx_configure_ac_patch.txt > pushd src/fwalls > patch <../../ipfw_ipv6_patch_2.txt > popd > autoreconf > ./configure --with-firewall=ipfw > make clean && make > > 4) If all builds well, try running sshguard with the "-d" parameter > and paste the following attack example: > > e.g. src/sshguard -d > > Attack Example: (if your email client wraps the string to multiple > lines, make sure it is one line before you paste into the sshguard > debug terminal) > > Apr 30 12:19:08 minimac sshd[7097]: Failed keyboard-interactive/pam > for invalid user asdf from 2001:db8::1 port 57453 ssh2 > > Paste the attack example into the terminal 4 times and you should see > the following at the end: > > Running command: '/sbin/ip6fw add 55045 drop ipv6 from 2001:db8::1 > to any'. > 55045 deny ipv6 from 2001:db8::1 to any > Command exited 0. > First sight of offender '2001:db8::1:6', adding to offenders list. > > If you see any other exit code than "Command exited 0.", please paste > the entire output buffer in a response email. > > --Thanks! > > -_Dave H > > ------------------------------------------------------------------------------ > The NEW KODAK i700 Series Scanners deliver under ANY circumstances! > Your > production scanning environment may not be a perfect world - but > thanks to > Kodak, there's a perfect scanner to get the job done! With the NEW > KODAK i700 > Series Scanner you'll get full speed at 300 dpi even with all image > processing features enabled. http://p.sf.net/sfu/kodak-com > _______________________________________________ > Sshguard-users mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshguard-users |
|
From: David H. <dho...@gm...> - 2009-05-09 15:20:39
|
Anyone on this list have access to a OSX 10.5 dev environment that is
willing to test some patches ?
I have a patch for ipfw firewall and ipv6 that I have tested on
FreeBSD 7, and OSX (ppc) 10.4, but I would prefer someone test with
OSX 10.5 or even snow leopard (intel or ppc) as well.
1) Get base code here:
svn co https://sshguard.svn.sourceforge.net/svnroot/sshguard sshguard
2) Get the patches (both) of them from here: (save to the
sshguard/trunk directory from step 1)
https://sourceforge.net/tracker/?func=detail&aid=2777559&group_id=188282&atid=924687
3) Apply patches and configure/build
su root
cd sshguard/trunk
patch <osx_configure_ac_patch.txt
pushd src/fwalls
patch <../../ipfw_ipv6_patch_2.txt
popd
autoreconf
./configure --with-firewall=ipfw
make clean && make
4) If all builds well, try running sshguard with the "-d" parameter
and paste the following attack example:
e.g. src/sshguard -d
Attack Example: (if your email client wraps the string to multiple
lines, make sure it is one line before you paste into the sshguard
debug terminal)
Apr 30 12:19:08 minimac sshd[7097]: Failed keyboard-interactive/pam
for invalid user asdf from 2001:db8::1 port 57453 ssh2
Paste the attack example into the terminal 4 times and you should see
the following at the end:
Running command: '/sbin/ip6fw add 55045 drop ipv6 from 2001:db8::1 to any'.
55045 deny ipv6 from 2001:db8::1 to any
Command exited 0.
First sight of offender '2001:db8::1:6', adding to offenders list.
If you see any other exit code than "Command exited 0.", please paste
the entire output buffer in a response email.
--Thanks!
-_Dave H
|
|
From: Hans F. N. <Han...@hi...> - 2009-04-22 09:49:43
|
* Mij <mi...@bi...> [2009-02-06]: > > On Feb 5, 2009, at 9:11 PM, Hans F. Nordhaug wrote: > > > * Forrest Aldrich <fo...@fo...> [2009-02-05]: > >> I have the same problem -- my method of blocking is visually > >> doing "tail -F access.log" and putting filters in. > >> > >> To use SSHGuard for this, you'd have to implement pattern > >> searches for the specific attacks... might be okay for a few, > >> annoying for more than that. I think something like > >> mod_security may help in this case (though I've never used it). > > > > Well, I don't think you have to do it that strict. I would say that if > > an IP is getting many 404 entries (maybe with the added condition of > > empty referrer) in very short time, it's likely to be a scanning > > attack. SSHGuard by default doesn't block for very long so if it was a > > legitime user hitting refresh like crazy, it wouldn't harm that much. > > I'm not quite convinced for 2 reasons: > 1) such rules appear quite "loose". I'm not sure this fits with the > conservative policy used so far to avoid false positives at the cost > of complexity. For example, crawlers issue a "GET /robots.txt" > which often results in a 404 and lacks a referer. On webservers > with plenty of vhosts a bunch of such requests within few minutes > may result in an undesired blocking. > > A solution can be to add to such conditions sensitivity to the > target filetype, and block only those involving dynamic scripts > like .php, .pl etc. > > > 2) Sshguard currently assumes that all attacks have the same > "density", that is, 4 attacks to ssh are "as dangerous" as 4 to > proftpd or anything else. This case breaks this assumption, as you > would require many more "404"s than login failures before > determining an abuse. > > A solution is either to define the conditions above "tight enough" > to raise the density of each attack, or to wait for me to > eventually implement the system based on scoring and threshold. Thx for your reply, michele, and sorry about not coming back to this issue before now. To me 1 isn't such a big problem - there are many ways to work around it. However, 2 is a real problem that I didn't think about. I clearly can't use the same "density" for SSH and HTTP. I think I'll wait for you ;-) I definetly think this would be a nice addition to SSHGuard, but I also realize that it might not make sense to extend SSHGuard to handle every thing. Maybe there are other tools out there that all ready do the job? I just happen to like SSHGuard. Regards, Hans |
|
From: Adam C. <ada...@be...> - 2009-04-21 22:32:51
|
sshguard 1.4rc3 on rhel5
My first host is up and running great and today I went to install to a
second host. But I must have missed documenting a step in my process
because I'm having an issue. Looks like the IP address isn't being
parsed out the log message correctly. Here's a simple example, running
from the command line with debug:
[root@ebi-prod01 sbin]# sshguard -d -a 2 -p 10
Started successfully [(a,p,s)=(2, 10, 1200)], now ready to scan.
Apr 21 14:11:00 ebi-prod01 sshd[21594]: Failed password for adam from
128.32.152.8 port 61158 ssh2
Starting parse
Entering state 0
Reading a token: --accepting rule at line 96 ("Apr 21 14:11:00
ebi-prod01 sshd[21594]:")
Next token is token SYSLOG_BANNER_PID ()
Shifting token SYSLOG_BANNER_PID ()
Entering state 1
Reading a token: --accepting rule at line 169 (" ")
--accepting rule at line 113 ("Failed password for adam from ")
Next token is token SSH_LOGINERR_PREF ()
Shifting token SSH_LOGINERR_PREF ()
Entering state 6
Reading a token: --accepting rule at line 159 ("128")
Next token is token INTEGER ()
Error: popping token SSH_LOGINERR_PREF ()
Stack now 0 1
Error: popping token SYSLOG_BANNER_PID ()
Stack now 0
Cleanup: discarding lookahead token INTEGER ()
Stack now 0
I've tried modifying the input but only get a reasonable response when I
use a hostname:
[root@ebi-prod01 sbin]# sshguard -d -a 2 -p 10
Started successfully [(a,p,s)=(2, 10, 1200)], now ready to scan.
Apr 21 14:11:00 ebi-prod01 sshd[21594]: Failed password for adam from
tech.dyn.berkeley.edu <http://tech.dyn.berkeley.edu> port 51152 ssh2
Starting parse
Entering state 0
Reading a token: --accepting rule at line 96 ("Apr 21 14:11:00
ebi-prod01 sshd[21594]:")
Next token is token SYSLOG_BANNER_PID ()
Shifting token SYSLOG_BANNER_PID ()
Entering state 1
Reading a token: --accepting rule at line 169 (" ")
--accepting rule at line 113 ("Failed password for adam from ")
Next token is token SSH_LOGINERR_PREF ()
Shifting token SSH_LOGINERR_PREF ()
Entering state 6
Reading a token: --accepting rule at line 158 ("tech.dyn.berkeley.edu
<http://tech.dyn.berkeley.edu>")
Next token is token HOSTADDR ()
Shifting token HOSTADDR ()
Entering state 40
Reducing stack by rule 18 (line 115):
$1 = token HOSTADDR ()
Could not resolve hostname 'tech.dyn.berkeley.edu
<http://tech.dyn.berkeley.edu>' in IPv4 address: Unknown host.
Could not resolve hostname 'tech.dyn.berkeley.edu
<http://tech.dyn.berkeley.edu>' in IPv6 address: Unknown host.
Could not resolve hostname 'tech.dyn.berkeley.edu
<http://tech.dyn.berkeley.edu>' in IPv4 nor IPv6 address!
Stack now 0 1 6
Cleanup: popping token SSH_LOGINERR_PREF ()
Cleanup: popping token SYSLOG_BANNER_PID ()
I've also recompiled and replaced the binary to no avail. I am afraid
that I did see this symptom at one point during my first installation
but I have no notes on what cleared the problem. Any suggestions?
thanks
Adam
--
Adam Cohen / IT Manager
Energy Biosciences Institute / UC Berkeley
109 Calvin Lab / 510-642-7709
|
|
From: michele <mi...@ma...> - 2009-04-21 16:34:56
|
On 21-04-2009 15:04, michele wrote: > How can I tell to sshguard (1.3) to block my ssh port and not the > default 22? Responding to myself... In fwalls/command_ipfilter.h there's the #define COMMAND_BLOCK which defines the IPFILTER rule to be added and the port 22 is hard coded. I think it should be interesting to have a command line option to pass to sshguard the ssh listening port, even if using a different port drastically decreases the number of scans by attackers. If you think this feature can be interesting, I can provide a patch. Bye |
|
From: michele <mi...@ma...> - 2009-04-21 13:04:28
|
On a FreeBSD machine, I've an ssh daemon listening on a port different from the default 22. After some failures, the following IPFILTER rule is added to my ipf.rules: block in quick proto tcp from x.x.x.x to any port = 22 How can I tell to sshguard (1.3) to block my ssh port and not the default 22? Thanks |
|
From: Greg P. <gre...@hc...> - 2009-04-21 12:27:41
|
Hi Mij, I have updated my init script to use the -d option and that is working. It does not appear to log to the auth.log file I am using, any details of the incoming blocked connections, I assume this is expected. Further I am not sure how to snap the entries into sshguard when running with -d, can you detail what you want me to do there or provide a link? Now here is an update as I have been watching this while running under the -d option. I got to 30 entries in the iptables chain and it stopped working. I was on the console and watching the logs go by from the -d output. I noticed at one point there was no more updates from the console. I attempted to login incorrectly from a few remote locations and I never got blocked, I could attempt to login over and over and there was NO output from sshguard as before. The process was still running but it was like it was just doing nothing. It remained like this for a few hours until restart. So our problem does not appear to be unrecognized entries but any entry after some time or some number of previous blocking events, it just stop s working. I used the init to stop and start and tested and it is working again all fine. Let me know how you would like to proceed on gathering more data on this issue if interested. Thanks, greg Mij wrote: > Hello, > > sorry for the latency, busy time. > > Whenever you see some log entries that you expect to be "suspicious" > but are > not recognized as such, you should repeat the manual check: pick the > log entry > as-is, and snap it into sshguard run with -d. This takes few seconds > and both > confirms whether the entry should be recognized, and if not shows why > with > descriptive output. > > Can you do this and, if failed, send in the precise log entry that > fails to be reported? > > > On Mar 26, 2009, at 17:10 , Greg Parrish wrote: > >> Greg Parrish wrote: >>> Mij wrote: >>>> As SimCList is used for recording those, there is no such limit by >>>> design. >>> Okay that is good to know. I check on another host we have >>> elsewhere and >>> it has 72 entries in the table so it is not seeing this limit. >>> >>>> What evidence makes you think that (nothing logged, errors or else)? >>> As mentioned there are entries showing in Logwatch for multiple >>> logins >>> on valid user names that are not being prevented after 2 failed >>> logins. >>> For example today: >>> >>> ftp/password from 219.94.152.55: 7 Time(s) >>> >>> Once I noticed this I logged in from a remote location with an >>> invalid >>> password and it does not initiate a block from my IP address. For >>> example: >>> >>> Mar 17 08:07:04 arnold sshd(pam_unix)[17502]: authentication failure; >>> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >>> user=gparrish >>> Mar 17 08:07:07 arnold sshd[17502]: Failed password for gparrish from >>> 129.90.96.101 port 12156 ssh2 >>> Mar 17 08:07:13 arnold last message repeated 2 times >>> Mar 17 08:07:13 arnold sshd[17505]: Connection closed by >>> 129.90.96.101 >>> Mar 17 08:07:13 arnold sshd(pam_unix)[17502]: 2 more authentication >>> failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >>> user=gparrish >>> Mar 17 08:07:14 arnold sshd(pam_unix)[17506]: authentication failure; >>> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >>> user=gparrish >>> Mar 17 08:07:17 arnold sshd[17506]: Failed password for gparrish from >>> 129.90.96.101 port 12186 ssh2 >>> Mar 17 08:07:23 arnold last message repeated 2 times >>> Mar 17 08:07:23 arnold sshd[17509]: Connection closed by >>> 129.90.96.101 >>> Mar 17 08:07:23 arnold sshd(pam_unix)[17506]: 2 more authentication >>> failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >>> user=gparrish >>> >>> >>>> Run sshguard in interactive mode (add -d) and paste attack lines >>>> repeatedly, change address once one has been blocked, and please >>>> report what happens >>>> at the 17th time. >>> I botched it. I used the init script to take it down and it cleared >>> the >>> iptables DROP list in the sshguard chain. I do have the new logging >>> where this same IP is now blocked: >>> >>> >>> Mar 17 08:11:25 arnold sshd(pam_unix)[17694]: authentication failure; >>> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >>> user=gparrish >>> Mar 17 08:11:27 arnold sshd[17694]: Failed password for gparrish from >>> 129.90.96.101 port 12353 ssh2 >>> Mar 17 08:11:33 arnold last message repeated 2 times >>> Mar 17 08:11:33 arnold sshd[17697]: Connection closed by >>> 129.90.96.101 >>> Mar 17 08:11:33 arnold sshd(pam_unix)[17694]: 2 more authentication >>> failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >>> user=gparrish >>> Mar 17 08:11:35 arnold sshd(pam_unix)[17698]: authentication failure; >>> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >>> user=gparrish >>> Mar 17 08:11:38 arnold sshd[17698]: Failed password for gparrish from >>> 129.90.96.101 port 12362 ssh2 >>> Mar 17 08:11:38 arnold sshguard[17605]: Blocking 129.90.96.101: 2 >>> failures over 10 seconds. >>> >>> >>> Once I get back to this point I will kill the process and initiate it >>> with the -d option and report back. >>> >>> Using Centos 4.2 on 2.6.9-22.0.1.ELsmp >>> >>> -greg >>> >>> >>> >>>> On Mar 10, 2009, at 14:01 , Greg Parrish wrote: >>>> >>>>> Hi, >>>>> >>>>> I am using the following parameters for sshguard (v1.3). I know >>>>> the -p >>>>> is huge and we dont mind blacklisting intruders for long periods. I >>>>> noticed today in logwatch and from further testing that once we >>>>> reach >>>>> about 16 entries in the accumulated list for iptables that no >>>>> further >>>>> entries are being accepted. >>>>> >>>>> /usr/local/sbin/sshguard -a 2 -p 25920000 -s 1800 -w /etc/ >>>>> sshguard.whitelist >>>>> >>>>> Please review and let me know if you need more information or logs. >>>>> I am >>>>> wondering if there is a limit somewhere in the binary or if this >>>>> is by >>>>> design. >>>>> >>>>> Thanks, >>>>> greg >>>>> >>> >>> ------------------------------------------------------------------------------ >>> Apps built with the Adobe(R) Flex(R) framework and Flex Builder(TM) >>> are >>> powering Web 2.0 with engaging, cross-platform capabilities. >>> Quickly and >>> easily build your RIAs with Flex Builder, the Eclipse(TM)based >>> development >>> software that enables intelligent coding and step-through debugging. >>> Download the free 60 day trial. http://p.sf.net/sfu/www-adobe-com >>> _______________________________________________ >>> Sshguard-users mailing list >>> Ssh...@li... >>> https://lists.sourceforge.net/lists/listinfo/sshguard-users >> >> >> Okay I have ran into this problem again. This time we have 12 >> entries in >> the drop table, last time was 16. Logwatch shows multiple root login >> attempts from the same IP which does not happen when this is working. >> >> I ran the command with the -d option but I get no output. I tried >> connecting to the host 7 times, with 3 failed logins each and nothing, >> so of what I am seeing otherwise. >> >> /usr/local/sbin/sshguard -d -a 2 -p 25920000 -s 1800 -w >> /etc/sshguard.whitelist >> >> >> SSH Guard Server Log from CLI: >> >> [hostname]# /usr/local/sbin/sshguard -d -a 2 -p 25920000 -s 1800 -w >> /etc/sshguard.whitelist >> whitelist: add '192.168.122.234' as plain IPv4. >> whitelist: add plain ip 192.168.122.234. >> whitelist: add '127.0.0.1' as plain IPv4. >> whitelist: add plain ip 127.0.0.1. >> Started successfully [(a,p,s)=(2, 25920000, 1800)], now ready to scan. >> >> -greg >> >> >> ------------------------------------------------------------------------------ >> _______________________________________________ >> Sshguard-users mailing list >> Ssh...@li... >> https://lists.sourceforge.net/lists/listinfo/sshguard-users > > > ------------------------------------------------------------------------------ > Stay on top of everything new and different, both inside and > around Java (TM) technology - register by April 22, and save > $200 on the JavaOne (SM) conference, June 2-5, 2009, San Francisco. > 300 plus technical and hands-on sessions. Register today. > Use priority code J9JMT32. http://p.sf.net/sfu/p > _______________________________________________ > Sshguard-users mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshguard-users |
|
From: Adam C. <ada...@be...> - 2009-04-20 03:21:58
|
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffcc" text="#000099">
<tt>1.4rc3<br>
<br>
I ran a simple test from a known ssh client and purposely entered a bad
password. Sshguard caught it and blocked the host. So I guess I need
to look more closely at why this other attacker isn't getting blocked.
<br>
<br>
It looks like he's trying to guess a user name and then makes one
password attempt before trying another account name. I might need to
lower the threshold to 1 but that could be harsh on real users who
mistype a legitimate password.<br>
<br>
</tt><br>
Mij wrote:
<blockquote cite="mid:CFE...@bi..."
type="cite">
<pre wrap="">On Apr 18, 2009, at 0:56 , Adam Cohen wrote:
</pre>
<blockquote type="cite">
<pre wrap="">Running interactively seems to work fine.
In my log, the message for the release that failed shows an
incomplete IP. (see "Releaseing 4...." below)
It looks like the IP address might not have been parsed out
completely?
Also, not sure how to report this, but my version of Redhat
generates a message that sshguard isn't catching. They look like
this:
Apr 17 14:42:41 prod-02 sshd[12923]: Failed password for invalid
user staff from 209.9.188.68 port 54513 ssh2
</pre>
</blockquote>
<pre wrap=""><!---->
This is supported; which version did you install? Have a peek at the
SVN version
<a class="moz-txt-link-freetext" href="http://sshguard.sourceforge.net/svn.html">http://sshguard.sourceforge.net/svn.html</a>
</pre>
<blockquote type="cite">
<pre wrap="">Can additional scanning rules be added by the user (me?) I will
look at the source in svn to see how this is structured.
</pre>
</blockquote>
<pre wrap=""><!---->
You can sure do that if you're vaguely familiar with Yacc parsers.
In general, users can submit here
<a class="moz-txt-link-freetext" href="http://sshguard.sourceforge.net/newattackpatt.php">http://sshguard.sourceforge.net/newattackpatt.php</a>
I periodically check there and integrate.
------------------------------------------------------------------------------
Stay on top of everything new and different, both inside and
around Java (TM) technology - register by April 22, and save
$200 on the JavaOne (SM) conference, June 2-5, 2009, San Francisco.
300 plus technical and hands-on sessions. Register today.
Use priority code J9JMT32. <a class="moz-txt-link-freetext" href="http://p.sf.net/sfu/p">http://p.sf.net/sfu/p</a>
_______________________________________________
Sshguard-users mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Ssh...@li...">Ssh...@li...</a>
<a class="moz-txt-link-freetext" href="https://lists.sourceforge.net/lists/listinfo/sshguard-users">https://lists.sourceforge.net/lists/listinfo/sshguard-users</a>
</pre>
</blockquote>
</body>
</html>
|
|
From: Mij <mi...@bi...> - 2009-04-18 12:41:59
|
On Apr 18, 2009, at 0:56 , Adam Cohen wrote: > Running interactively seems to work fine. > > In my log, the message for the release that failed shows an > incomplete IP. (see "Releaseing 4...." below) > It looks like the IP address might not have been parsed out > completely? > > Also, not sure how to report this, but my version of Redhat > generates a message that sshguard isn't catching. They look like > this: > > Apr 17 14:42:41 prod-02 sshd[12923]: Failed password for invalid > user staff from 209.9.188.68 port 54513 ssh2 This is supported; which version did you install? Have a peek at the SVN version http://sshguard.sourceforge.net/svn.html > Can additional scanning rules be added by the user (me?) I will > look at the source in svn to see how this is structured. You can sure do that if you're vaguely familiar with Yacc parsers. In general, users can submit here http://sshguard.sourceforge.net/newattackpatt.php I periodically check there and integrate. |
|
From: Adam C. <ada...@be...> - 2009-04-17 22:57:10
|
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
Running interactively seems to work fine. <br>
<br>
In my log, the message for the release that failed shows an incomplete
IP. (see "Releaseing 4...." below)<br>
It looks like the IP address might not have been parsed out completely?<br>
<br>
Also, not sure how to report this, but my version of Redhat generates a
message that sshguard isn't catching. They look like this:<br>
<br>
<div class="moz-text-html" lang="x-western"><tt>Apr 17 14:42:41 prod-02
sshd[12923]: Failed password for invalid user staff from 209.9.188.68
port 54513 ssh2<br>
</tt></div>
<br>
Can additional scanning rules be added by the user (me?) I will look
at the source in svn to see how this is structured.<br>
<br>
thanks<br>
Adam<br>
<br>
<br>
Mij wrote:
<blockquote cite="mid:2EE...@bi..."
type="cite">
<pre wrap="">On Apr 16, 2009, at 19:09 , Adam Cohen wrote:
</pre>
<blockquote type="cite">
<pre wrap="">greetings,
I've recently installed sshguard 1x. on a Redhat box and it seems to
be
working well. However, I noticed the following on my system log:
Apr 14 14:43:22 prod-02 sshguard[23831]: Releasing 4 after 1239745402
seconds.
Apr 14 14:43:22 prod-02 sshguard[23831]: Release command failed.
Exited: -1
Seems like the dynamic removal of blocked hosts from iptables is
failing. iptables -L shows multiple entries for the same host on the
sshguard chain. Is this a valid conclusion?
</pre>
</blockquote>
<pre wrap=""><!---->
yes, reasonable if releasing fails.
</pre>
<blockquote type="cite">
<pre wrap="">Any ideas on why or how to fix?
</pre>
</blockquote>
<pre wrap=""><!---->
can you run sshguard manually, as root:
/usr/local/bin/sshguard -d -a2 -p10
and then paste *2 times* as its input one line like:
Apr 12 10:11:12 foo sshd[1234]: Invalid user root from 1.2.3.4
it should block the address. Wait some seconds, it should release it.
If you still see the "Release command failed. Exited: -1", there
should now be more debug info. Please send that in.
</pre>
<blockquote type="cite">
<pre wrap="">thanks
--
Adam Cohen
IT Manager
Energy Biosciences Institute
109 Calvin Lab
642-7709
------------------------------------------------------------------------------
Stay on top of everything new and different, both inside and
around Java (TM) technology - register by April 22, and save
$200 on the JavaOne (SM) conference, June 2-5, 2009, San Francisco.
300 plus technical and hands-on sessions. Register today.
Use priority code J9JMT32. <a class="moz-txt-link-freetext" href="http://p.sf.net/sfu/p">http://p.sf.net/sfu/p</a>
_______________________________________________
Sshguard-users mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Ssh...@li...">Ssh...@li...</a>
<a class="moz-txt-link-freetext" href="https://lists.sourceforge.net/lists/listinfo/sshguard-users">https://lists.sourceforge.net/lists/listinfo/sshguard-users</a>
</pre>
</blockquote>
<pre wrap=""><!---->
------------------------------------------------------------------------------
Stay on top of everything new and different, both inside and
around Java (TM) technology - register by April 22, and save
$200 on the JavaOne (SM) conference, June 2-5, 2009, San Francisco.
300 plus technical and hands-on sessions. Register today.
Use priority code J9JMT32. <a class="moz-txt-link-freetext" href="http://p.sf.net/sfu/p">http://p.sf.net/sfu/p</a>
_______________________________________________
Sshguard-users mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Ssh...@li...">Ssh...@li...</a>
<a class="moz-txt-link-freetext" href="https://lists.sourceforge.net/lists/listinfo/sshguard-users">https://lists.sourceforge.net/lists/listinfo/sshguard-users</a>
</pre>
</blockquote>
<br>
<pre class="moz-signature" cols="72">--
Adam Cohen / IT Manager
Energy Biosciences Institute / UC Berkeley
109 Calvin Lab / 510-642-7709
</pre>
</body>
</html>
|
|
From: Mij <mi...@bi...> - 2009-04-17 08:32:34
|
On Apr 16, 2009, at 19:09 , Adam Cohen wrote: > greetings, > I've recently installed sshguard 1x. on a Redhat box and it seems to > be > working well. However, I noticed the following on my system log: > > Apr 14 14:43:22 prod-02 sshguard[23831]: Releasing 4 after 1239745402 > seconds. > Apr 14 14:43:22 prod-02 sshguard[23831]: Release command failed. > Exited: -1 > > Seems like the dynamic removal of blocked hosts from iptables is > failing. iptables -L shows multiple entries for the same host on the > sshguard chain. Is this a valid conclusion? yes, reasonable if releasing fails. > Any ideas on why or how to fix? can you run sshguard manually, as root: /usr/local/bin/sshguard -d -a2 -p10 and then paste *2 times* as its input one line like: Apr 12 10:11:12 foo sshd[1234]: Invalid user root from 1.2.3.4 it should block the address. Wait some seconds, it should release it. If you still see the "Release command failed. Exited: -1", there should now be more debug info. Please send that in. > > thanks > > -- > Adam Cohen > IT Manager > Energy Biosciences Institute > 109 Calvin Lab > 642-7709 > > > ------------------------------------------------------------------------------ > Stay on top of everything new and different, both inside and > around Java (TM) technology - register by April 22, and save > $200 on the JavaOne (SM) conference, June 2-5, 2009, San Francisco. > 300 plus technical and hands-on sessions. Register today. > Use priority code J9JMT32. http://p.sf.net/sfu/p > _______________________________________________ > Sshguard-users mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshguard-users |
|
From: Mij <mi...@bi...> - 2009-04-17 08:26:46
|
Hello, sorry for the latency, busy time. Whenever you see some log entries that you expect to be "suspicious" but are not recognized as such, you should repeat the manual check: pick the log entry as-is, and snap it into sshguard run with -d. This takes few seconds and both confirms whether the entry should be recognized, and if not shows why with descriptive output. Can you do this and, if failed, send in the precise log entry that fails to be reported? On Mar 26, 2009, at 17:10 , Greg Parrish wrote: > Greg Parrish wrote: >> Mij wrote: >>> As SimCList is used for recording those, there is no such limit by >>> design. >> >> Okay that is good to know. I check on another host we have >> elsewhere and >> it has 72 entries in the table so it is not seeing this limit. >> >>> What evidence makes you think that (nothing logged, errors or else)? >> >> As mentioned there are entries showing in Logwatch for multiple >> logins >> on valid user names that are not being prevented after 2 failed >> logins. >> For example today: >> >> ftp/password from 219.94.152.55: 7 Time(s) >> >> Once I noticed this I logged in from a remote location with an >> invalid >> password and it does not initiate a block from my IP address. For >> example: >> >> Mar 17 08:07:04 arnold sshd(pam_unix)[17502]: authentication failure; >> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >> user=gparrish >> Mar 17 08:07:07 arnold sshd[17502]: Failed password for gparrish from >> 129.90.96.101 port 12156 ssh2 >> Mar 17 08:07:13 arnold last message repeated 2 times >> Mar 17 08:07:13 arnold sshd[17505]: Connection closed by >> 129.90.96.101 >> Mar 17 08:07:13 arnold sshd(pam_unix)[17502]: 2 more authentication >> failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >> user=gparrish >> Mar 17 08:07:14 arnold sshd(pam_unix)[17506]: authentication failure; >> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >> user=gparrish >> Mar 17 08:07:17 arnold sshd[17506]: Failed password for gparrish from >> 129.90.96.101 port 12186 ssh2 >> Mar 17 08:07:23 arnold last message repeated 2 times >> Mar 17 08:07:23 arnold sshd[17509]: Connection closed by >> 129.90.96.101 >> Mar 17 08:07:23 arnold sshd(pam_unix)[17506]: 2 more authentication >> failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >> user=gparrish >> >> >>> Run sshguard in interactive mode (add -d) and paste attack lines >>> repeatedly, change address once one has been blocked, and please >>> report what happens >>> at the 17th time. >> >> I botched it. I used the init script to take it down and it cleared >> the >> iptables DROP list in the sshguard chain. I do have the new logging >> where this same IP is now blocked: >> >> >> Mar 17 08:11:25 arnold sshd(pam_unix)[17694]: authentication failure; >> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >> user=gparrish >> Mar 17 08:11:27 arnold sshd[17694]: Failed password for gparrish from >> 129.90.96.101 port 12353 ssh2 >> Mar 17 08:11:33 arnold last message repeated 2 times >> Mar 17 08:11:33 arnold sshd[17697]: Connection closed by >> 129.90.96.101 >> Mar 17 08:11:33 arnold sshd(pam_unix)[17694]: 2 more authentication >> failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >> user=gparrish >> Mar 17 08:11:35 arnold sshd(pam_unix)[17698]: authentication failure; >> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >> user=gparrish >> Mar 17 08:11:38 arnold sshd[17698]: Failed password for gparrish from >> 129.90.96.101 port 12362 ssh2 >> Mar 17 08:11:38 arnold sshguard[17605]: Blocking 129.90.96.101: 2 >> failures over 10 seconds. >> >> >> Once I get back to this point I will kill the process and initiate it >> with the -d option and report back. >> >> Using Centos 4.2 on 2.6.9-22.0.1.ELsmp >> >> -greg >> >> >> >>> >>> On Mar 10, 2009, at 14:01 , Greg Parrish wrote: >>> >>>> Hi, >>>> >>>> I am using the following parameters for sshguard (v1.3). I know >>>> the -p >>>> is huge and we dont mind blacklisting intruders for long periods. I >>>> noticed today in logwatch and from further testing that once we >>>> reach >>>> about 16 entries in the accumulated list for iptables that no >>>> further >>>> entries are being accepted. >>>> >>>> /usr/local/sbin/sshguard -a 2 -p 25920000 -s 1800 -w /etc/ >>>> sshguard.whitelist >>>> >>>> Please review and let me know if you need more information or logs. >>>> I am >>>> wondering if there is a limit somewhere in the binary or if this >>>> is by >>>> design. >>>> >>>> Thanks, >>>> greg >>>> >> >> >> ------------------------------------------------------------------------------ >> Apps built with the Adobe(R) Flex(R) framework and Flex Builder(TM) >> are >> powering Web 2.0 with engaging, cross-platform capabilities. >> Quickly and >> easily build your RIAs with Flex Builder, the Eclipse(TM)based >> development >> software that enables intelligent coding and step-through debugging. >> Download the free 60 day trial. http://p.sf.net/sfu/www-adobe-com >> _______________________________________________ >> Sshguard-users mailing list >> Ssh...@li... >> https://lists.sourceforge.net/lists/listinfo/sshguard-users > > > > Okay I have ran into this problem again. This time we have 12 > entries in > the drop table, last time was 16. Logwatch shows multiple root login > attempts from the same IP which does not happen when this is working. > > I ran the command with the -d option but I get no output. I tried > connecting to the host 7 times, with 3 failed logins each and nothing, > so of what I am seeing otherwise. > > /usr/local/sbin/sshguard -d -a 2 -p 25920000 -s 1800 -w > /etc/sshguard.whitelist > > > SSH Guard Server Log from CLI: > > [hostname]# /usr/local/sbin/sshguard -d -a 2 -p 25920000 -s 1800 -w > /etc/sshguard.whitelist > whitelist: add '192.168.122.234' as plain IPv4. > whitelist: add plain ip 192.168.122.234. > whitelist: add '127.0.0.1' as plain IPv4. > whitelist: add plain ip 127.0.0.1. > Started successfully [(a,p,s)=(2, 25920000, 1800)], now ready to scan. > > -greg > > > ------------------------------------------------------------------------------ > _______________________________________________ > Sshguard-users mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshguard-users |
|
From: Mij <mi...@bi...> - 2009-04-17 08:19:24
|
On Mar 10, 2009, at 15:53 , Leonid Shulov wrote: > sshguar has not stopped attack from IP, which were sent 1 ssh in 1 > second - to 2-10 seconds. > In my opinion attack needs to be stopped if from one IP more -a<> hits > in -p<> seconds. > > Mar 10 14:30:27 router sshd[28492]: Invalid user raimundo from > 83.15.28.2 > Mar 10 14:30:28 router sshd[28494]: Invalid user joan from 83.15.28.2 > [...] > Mar 10 14:31:17 router sshd[28550]: Invalid user altagracia from > 83.15.28.2 > Mar 10 14:31:19 router sshd[28552]: Invalid user piedad from > 83.19.51.22 > ........ > > Now I try svn rev. 85 with: > router:~/sshguard_svn_090310/sshguard/src# ./sshguard -d -a 2 -b > 1:/var/cache/sshguard/blacklist these entries are valid, they should be recognized. What does this latter test say? When run regularly, you should see log entries like "Blocking 83.15.28.2:4 for ". If these don't appear, sshguard is probably not receiving such log messages. If they do appear and the address is not blocked, there may be a problem with the firewall backend (permissions, or mechanism). |
|
From: Mij <mi...@bi...> - 2009-04-17 08:17:14
|
On Apr 8, 2009, at 14:27 , Greg Parrish wrote: > I am still having this same issue as it continues every few days. This > time had about 20 entries in the iptable sshguard chain before it stop > working. > > 1. Start sshguard using init script > 2. Runs fine and stops attacks for days (verified with logwatch) > 3. New logwatch shows many ssh root login attempts from single IP > 4. Restart sshgaurd using init, clears iptables chain and begins > working > > I have verified the above using my own failed login from outside > hosts. > > Again I stopped sshguard using pkill and then the init (which clears > the > chain filter list) and ran this manually as requested and it does > nothing, no log, no screen output. Can I get some idea on how to > better > troubleshoot this issue please? this is interesting news. I have never observed this behavior and I'm very interested in it. Please do this: 1) wait until you observe this behaviour (stopping recognition) 2) locate the place in logs where sshguard started last 3) send in all the log activity related to ssh after that. You can easily use awk to obfuscate hostnames, IPs and user names. As I can't reproduce this behaviour, I don't see any other way to inspect the problem. > > [root@hostname ~]# /usr/local/sbin/sshguard -d -a 2 -p 2592000 -s 1800 > -w /etc/sshguard.whitelist > whitelist: add '192.168.122.234' as plain IPv4. > whitelist: add plain ip 192.168.122.234. > whitelist: add '127.0.0.1' as plain IPv4. > whitelist: add plain ip 127.0.0.1. > Started successfully [(a,p,s)=(2, 2592000, 1800)], now ready to scan. > > > After a few attacks from the outside (>2) there is no blocking, no > log, > nothing when running this manually as suggested previously as seen > above. > > Thanks much, > -greg |
|
From: Adam C. <ada...@be...> - 2009-04-16 17:09:58
|
greetings, I've recently installed sshguard 1x. on a Redhat box and it seems to be working well. However, I noticed the following on my system log: Apr 14 14:43:22 prod-02 sshguard[23831]: Releasing 4 after 1239745402 seconds. Apr 14 14:43:22 prod-02 sshguard[23831]: Release command failed. Exited: -1 Seems like the dynamic removal of blocked hosts from iptables is failing. iptables -L shows multiple entries for the same host on the sshguard chain. Is this a valid conclusion? Any ideas on why or how to fix? thanks -- Adam Cohen IT Manager Energy Biosciences Institute 109 Calvin Lab 642-7709 |
|
From: Greg P. <gre...@hc...> - 2009-04-08 14:11:30
|
Greg Parrish wrote: > Greg Parrish wrote: >> Mij wrote: >>> As SimCList is used for recording those, there is no such limit by >>> design. >> Okay that is good to know. I check on another host we have elsewhere and >> it has 72 entries in the table so it is not seeing this limit. >> >>> What evidence makes you think that (nothing logged, errors or else)? >> As mentioned there are entries showing in Logwatch for multiple logins >> on valid user names that are not being prevented after 2 failed logins. >> For example today: >> >> ftp/password from 219.94.152.55: 7 Time(s) >> >> Once I noticed this I logged in from a remote location with an invalid >> password and it does not initiate a block from my IP address. For example: >> >> Mar 17 08:07:04 arnold sshd(pam_unix)[17502]: authentication failure; >> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish >> Mar 17 08:07:07 arnold sshd[17502]: Failed password for gparrish from >> 129.90.96.101 port 12156 ssh2 >> Mar 17 08:07:13 arnold last message repeated 2 times >> Mar 17 08:07:13 arnold sshd[17505]: Connection closed by 129.90.96.101 >> Mar 17 08:07:13 arnold sshd(pam_unix)[17502]: 2 more authentication >> failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >> user=gparrish >> Mar 17 08:07:14 arnold sshd(pam_unix)[17506]: authentication failure; >> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish >> Mar 17 08:07:17 arnold sshd[17506]: Failed password for gparrish from >> 129.90.96.101 port 12186 ssh2 >> Mar 17 08:07:23 arnold last message repeated 2 times >> Mar 17 08:07:23 arnold sshd[17509]: Connection closed by 129.90.96.101 >> Mar 17 08:07:23 arnold sshd(pam_unix)[17506]: 2 more authentication >> failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >> user=gparrish >> >> >>> Run sshguard in interactive mode (add -d) and paste attack lines >>> repeatedly, change address once one has been blocked, and please report what happens >>> at the 17th time. >> I botched it. I used the init script to take it down and it cleared the >> iptables DROP list in the sshguard chain. I do have the new logging >> where this same IP is now blocked: >> >> >> Mar 17 08:11:25 arnold sshd(pam_unix)[17694]: authentication failure; >> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish >> Mar 17 08:11:27 arnold sshd[17694]: Failed password for gparrish from >> 129.90.96.101 port 12353 ssh2 >> Mar 17 08:11:33 arnold last message repeated 2 times >> Mar 17 08:11:33 arnold sshd[17697]: Connection closed by 129.90.96.101 >> Mar 17 08:11:33 arnold sshd(pam_unix)[17694]: 2 more authentication >> failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 >> user=gparrish >> Mar 17 08:11:35 arnold sshd(pam_unix)[17698]: authentication failure; >> logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish >> Mar 17 08:11:38 arnold sshd[17698]: Failed password for gparrish from >> 129.90.96.101 port 12362 ssh2 >> Mar 17 08:11:38 arnold sshguard[17605]: Blocking 129.90.96.101: 2 >> failures over 10 seconds. >> >> >> Once I get back to this point I will kill the process and initiate it >> with the -d option and report back. >> >> Using Centos 4.2 on 2.6.9-22.0.1.ELsmp >> >> -greg >> >> >> >>> On Mar 10, 2009, at 14:01 , Greg Parrish wrote: >>> >>>> Hi, >>>> >>>> I am using the following parameters for sshguard (v1.3). I know the -p >>>> is huge and we dont mind blacklisting intruders for long periods. I >>>> noticed today in logwatch and from further testing that once we reach >>>> about 16 entries in the accumulated list for iptables that no further >>>> entries are being accepted. >>>> >>>> /usr/local/sbin/sshguard -a 2 -p 25920000 -s 1800 -w /etc/ >>>> sshguard.whitelist >>>> >>>> Please review and let me know if you need more information or logs. >>>> I am >>>> wondering if there is a limit somewhere in the binary or if this is by >>>> design. >>>> >>>> Thanks, >>>> greg >>>> >> >> ------------------------------------------------------------------------------ >> Apps built with the Adobe(R) Flex(R) framework and Flex Builder(TM) are >> powering Web 2.0 with engaging, cross-platform capabilities. Quickly and >> easily build your RIAs with Flex Builder, the Eclipse(TM)based development >> software that enables intelligent coding and step-through debugging. >> Download the free 60 day trial. http://p.sf.net/sfu/www-adobe-com >> _______________________________________________ >> Sshguard-users mailing list >> Ssh...@li... >> https://lists.sourceforge.net/lists/listinfo/sshguard-users > > > > Okay I have ran into this problem again. This time we have 12 entries in > the drop table, last time was 16. Logwatch shows multiple root login > attempts from the same IP which does not happen when this is working. > > I ran the command with the -d option but I get no output. I tried > connecting to the host 7 times, with 3 failed logins each and nothing, > so of what I am seeing otherwise. > > /usr/local/sbin/sshguard -d -a 2 -p 25920000 -s 1800 -w > /etc/sshguard.whitelist > > > SSH Guard Server Log from CLI: > > [hostname]# /usr/local/sbin/sshguard -d -a 2 -p 25920000 -s 1800 -w > /etc/sshguard.whitelist > whitelist: add '192.168.122.234' as plain IPv4. > whitelist: add plain ip 192.168.122.234. > whitelist: add '127.0.0.1' as plain IPv4. > whitelist: add plain ip 127.0.0.1. > Started successfully [(a,p,s)=(2, 25920000, 1800)], now ready to scan. > > -greg > > I am still having this same issue as it continues every few days. This time had about 20 entries in the iptable sshguard chain before it stop working. 1. Start sshguard using init script 2. Runs fine and stops attacks for days (verified with logwatch) 3. New logwatch shows many ssh root login attempts from single IP 4. Restart sshgaurd using init, clears iptables chain and begins working I have verified the above using my own failed login from outside hosts. Again I stopped sshguard using pkill and then the init (which clears the chain filter list) and ran this manually as requested and it does nothing, no log, no screen output. Can I get some idea on how to better troubleshoot this issue please? [root@hostname ~]# /usr/local/sbin/sshguard -d -a 2 -p 2592000 -s 1800 -w /etc/sshguard.whitelist whitelist: add '192.168.122.234' as plain IPv4. whitelist: add plain ip 192.168.122.234. whitelist: add '127.0.0.1' as plain IPv4. whitelist: add plain ip 127.0.0.1. Started successfully [(a,p,s)=(2, 2592000, 1800)], now ready to scan. After a few attacks from the outside (>2) there is no blocking, no log, nothing when running this manually as suggested previously as seen above. Thanks much, -greg |
|
From: Greg P. <gre...@hc...> - 2009-03-26 16:10:44
|
Greg Parrish wrote: > Mij wrote: >> As SimCList is used for recording those, there is no such limit by >> design. > > Okay that is good to know. I check on another host we have elsewhere and > it has 72 entries in the table so it is not seeing this limit. > >> What evidence makes you think that (nothing logged, errors or else)? > > As mentioned there are entries showing in Logwatch for multiple logins > on valid user names that are not being prevented after 2 failed logins. > For example today: > > ftp/password from 219.94.152.55: 7 Time(s) > > Once I noticed this I logged in from a remote location with an invalid > password and it does not initiate a block from my IP address. For example: > > Mar 17 08:07:04 arnold sshd(pam_unix)[17502]: authentication failure; > logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish > Mar 17 08:07:07 arnold sshd[17502]: Failed password for gparrish from > 129.90.96.101 port 12156 ssh2 > Mar 17 08:07:13 arnold last message repeated 2 times > Mar 17 08:07:13 arnold sshd[17505]: Connection closed by 129.90.96.101 > Mar 17 08:07:13 arnold sshd(pam_unix)[17502]: 2 more authentication > failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 > user=gparrish > Mar 17 08:07:14 arnold sshd(pam_unix)[17506]: authentication failure; > logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish > Mar 17 08:07:17 arnold sshd[17506]: Failed password for gparrish from > 129.90.96.101 port 12186 ssh2 > Mar 17 08:07:23 arnold last message repeated 2 times > Mar 17 08:07:23 arnold sshd[17509]: Connection closed by 129.90.96.101 > Mar 17 08:07:23 arnold sshd(pam_unix)[17506]: 2 more authentication > failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 > user=gparrish > > >> Run sshguard in interactive mode (add -d) and paste attack lines >> repeatedly, change address once one has been blocked, and please report what happens >> at the 17th time. > > I botched it. I used the init script to take it down and it cleared the > iptables DROP list in the sshguard chain. I do have the new logging > where this same IP is now blocked: > > > Mar 17 08:11:25 arnold sshd(pam_unix)[17694]: authentication failure; > logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish > Mar 17 08:11:27 arnold sshd[17694]: Failed password for gparrish from > 129.90.96.101 port 12353 ssh2 > Mar 17 08:11:33 arnold last message repeated 2 times > Mar 17 08:11:33 arnold sshd[17697]: Connection closed by 129.90.96.101 > Mar 17 08:11:33 arnold sshd(pam_unix)[17694]: 2 more authentication > failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 > user=gparrish > Mar 17 08:11:35 arnold sshd(pam_unix)[17698]: authentication failure; > logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish > Mar 17 08:11:38 arnold sshd[17698]: Failed password for gparrish from > 129.90.96.101 port 12362 ssh2 > Mar 17 08:11:38 arnold sshguard[17605]: Blocking 129.90.96.101: 2 > failures over 10 seconds. > > > Once I get back to this point I will kill the process and initiate it > with the -d option and report back. > > Using Centos 4.2 on 2.6.9-22.0.1.ELsmp > > -greg > > > >> >> On Mar 10, 2009, at 14:01 , Greg Parrish wrote: >> >>> Hi, >>> >>> I am using the following parameters for sshguard (v1.3). I know the -p >>> is huge and we dont mind blacklisting intruders for long periods. I >>> noticed today in logwatch and from further testing that once we reach >>> about 16 entries in the accumulated list for iptables that no further >>> entries are being accepted. >>> >>> /usr/local/sbin/sshguard -a 2 -p 25920000 -s 1800 -w /etc/ >>> sshguard.whitelist >>> >>> Please review and let me know if you need more information or logs. >>> I am >>> wondering if there is a limit somewhere in the binary or if this is by >>> design. >>> >>> Thanks, >>> greg >>> > > > ------------------------------------------------------------------------------ > Apps built with the Adobe(R) Flex(R) framework and Flex Builder(TM) are > powering Web 2.0 with engaging, cross-platform capabilities. Quickly and > easily build your RIAs with Flex Builder, the Eclipse(TM)based development > software that enables intelligent coding and step-through debugging. > Download the free 60 day trial. http://p.sf.net/sfu/www-adobe-com > _______________________________________________ > Sshguard-users mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshguard-users Okay I have ran into this problem again. This time we have 12 entries in the drop table, last time was 16. Logwatch shows multiple root login attempts from the same IP which does not happen when this is working. I ran the command with the -d option but I get no output. I tried connecting to the host 7 times, with 3 failed logins each and nothing, so of what I am seeing otherwise. /usr/local/sbin/sshguard -d -a 2 -p 25920000 -s 1800 -w /etc/sshguard.whitelist SSH Guard Server Log from CLI: [hostname]# /usr/local/sbin/sshguard -d -a 2 -p 25920000 -s 1800 -w /etc/sshguard.whitelist whitelist: add '192.168.122.234' as plain IPv4. whitelist: add plain ip 192.168.122.234. whitelist: add '127.0.0.1' as plain IPv4. whitelist: add plain ip 127.0.0.1. Started successfully [(a,p,s)=(2, 25920000, 1800)], now ready to scan. -greg |
|
From: Greg P. <gre...@hc...> - 2009-03-17 12:15:43
|
Mij wrote:
> As SimCList is used for recording those, there is no such limit by
> design.
Okay that is good to know. I check on another host we have elsewhere and
it has 72 entries in the table so it is not seeing this limit.
> What evidence makes you think that (nothing logged, errors or else)?
As mentioned there are entries showing in Logwatch for multiple logins
on valid user names that are not being prevented after 2 failed logins.
For example today:
ftp/password from 219.94.152.55: 7 Time(s)
Once I noticed this I logged in from a remote location with an invalid
password and it does not initiate a block from my IP address. For example:
Mar 17 08:07:04 arnold sshd(pam_unix)[17502]: authentication failure;
logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish
Mar 17 08:07:07 arnold sshd[17502]: Failed password for gparrish from
129.90.96.101 port 12156 ssh2
Mar 17 08:07:13 arnold last message repeated 2 times
Mar 17 08:07:13 arnold sshd[17505]: Connection closed by 129.90.96.101
Mar 17 08:07:13 arnold sshd(pam_unix)[17502]: 2 more authentication
failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101
user=gparrish
Mar 17 08:07:14 arnold sshd(pam_unix)[17506]: authentication failure;
logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish
Mar 17 08:07:17 arnold sshd[17506]: Failed password for gparrish from
129.90.96.101 port 12186 ssh2
Mar 17 08:07:23 arnold last message repeated 2 times
Mar 17 08:07:23 arnold sshd[17509]: Connection closed by 129.90.96.101
Mar 17 08:07:23 arnold sshd(pam_unix)[17506]: 2 more authentication
failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101
user=gparrish
> Run sshguard in interactive mode (add -d) and paste attack lines
> repeatedly, change address once one has been blocked, and please report what happens
> at the 17th time.
I botched it. I used the init script to take it down and it cleared the
iptables DROP list in the sshguard chain. I do have the new logging
where this same IP is now blocked:
Mar 17 08:11:25 arnold sshd(pam_unix)[17694]: authentication failure;
logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish
Mar 17 08:11:27 arnold sshd[17694]: Failed password for gparrish from
129.90.96.101 port 12353 ssh2
Mar 17 08:11:33 arnold last message repeated 2 times
Mar 17 08:11:33 arnold sshd[17697]: Connection closed by 129.90.96.101
Mar 17 08:11:33 arnold sshd(pam_unix)[17694]: 2 more authentication
failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101
user=gparrish
Mar 17 08:11:35 arnold sshd(pam_unix)[17698]: authentication failure;
logname= uid=0 euid=0 tty=ssh ruser= rhost=129.90.96.101 user=gparrish
Mar 17 08:11:38 arnold sshd[17698]: Failed password for gparrish from
129.90.96.101 port 12362 ssh2
Mar 17 08:11:38 arnold sshguard[17605]: Blocking 129.90.96.101: 2
failures over 10 seconds.
Once I get back to this point I will kill the process and initiate it
with the -d option and report back.
Using Centos 4.2 on 2.6.9-22.0.1.ELsmp
-greg
>
>
> On Mar 10, 2009, at 14:01 , Greg Parrish wrote:
>
>> Hi,
>>
>> I am using the following parameters for sshguard (v1.3). I know the -p
>> is huge and we dont mind blacklisting intruders for long periods. I
>> noticed today in logwatch and from further testing that once we reach
>> about 16 entries in the accumulated list for iptables that no further
>> entries are being accepted.
>>
>> /usr/local/sbin/sshguard -a 2 -p 25920000 -s 1800 -w /etc/
>> sshguard.whitelist
>>
>> Please review and let me know if you need more information or logs.
>> I am
>> wondering if there is a limit somewhere in the binary or if this is by
>> design.
>>
>> Thanks,
>> greg
>>
|
|
From: Mij <mi...@bi...> - 2009-03-16 02:28:57
|
As SimCList is used for recording those, there is no such limit by design. What evidence makes you think that (nothing logged, errors or else)? Run sshguard in interactive mode (add -d) and paste attack lines repeatedly, change address once one has been blocked, and please report what happens at the 17th time. On Mar 10, 2009, at 14:01 , Greg Parrish wrote: > Hi, > > I am using the following parameters for sshguard (v1.3). I know the -p > is huge and we dont mind blacklisting intruders for long periods. I > noticed today in logwatch and from further testing that once we reach > about 16 entries in the accumulated list for iptables that no further > entries are being accepted. > > /usr/local/sbin/sshguard -a 2 -p 25920000 -s 1800 -w /etc/ > sshguard.whitelist > > Please review and let me know if you need more information or logs. > I am > wondering if there is a limit somewhere in the binary or if this is by > design. > > Thanks, > greg > > > ------------------------------------------------------------------------------ > _______________________________________________ > Sshguard-users mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshguard-users |
|
From: Mij <mi...@bi...> - 2009-03-14 12:33:30
|
As SimCList is used for recording those, there is no such limit by design. What evidence makes you think that (nothing logged, errors or else)? Run sshguard in interactive mode (add -d) and paste attack lines repeatedly, change address once one has been blocked, and please report what happens at the 17th time. > Hi, > > I am using the following parameters for sshguard (v1.3). I know the -p > is huge and we dont mind blacklisting intruders for long periods. I > noticed today in logwatch and from further testing that once we reach > about 16 entries in the accumulated list for iptables that no further > entries are being accepted. > > /usr/local/sbin/sshguard -a 2 -p 25920000 -s 1800 -w > /etc/sshguard.whitelist > > Please review and let me know if you need more information or logs. I am > wondering if there is a limit somewhere in the binary or if this is by > design. > > Thanks, > greg > > > ------------------------------------------------------------------------------ > _______________________________________________ > Sshguard-users mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshguard-users > |
|
From: Leonid S. <Leo...@en...> - 2009-03-10 14:53:44
|
sshguar has not stopped attack from IP, which were sent 1 ssh in 1 second - to 2-10 seconds. In my opinion attack needs to be stopped if from one IP more -a<> hits in -p<> seconds. Mar 10 14:30:27 router sshd[28492]: Invalid user raimundo from 83.15.28.2 Mar 10 14:30:28 router sshd[28494]: Invalid user joan from 83.15.28.2 Mar 10 14:30:33 router sshd[28496]: Invalid user johan from 83.19.51.22 Mar 10 14:30:34 router sshd[28498]: Invalid user sebastian from 83.15.28.2 Mar 10 14:30:35 router sshd[28500]: Invalid user agata from 83.15.28.2 Mar 10 14:30:40 router sshd[28502]: Invalid user administrator from 83.19.51.22 Mar 10 14:30:42 router sshd[28506]: Invalid user alexandre from 83.19.51.22 Mar 10 14:30:43 router sshd[28508]: Invalid user joseluis from 83.15.28.2 Mar 10 14:30:44 router sshd[28510]: Invalid user ppazmino from 83.15.28.2 Mar 10 14:30:46 router sshd[28512]: Invalid user utilidades from 83.19.51.22 Mar 10 14:30:47 router sshd[28514]: Invalid user utilidad from 83.15.28.2 Mar 10 14:30:48 router sshd[28516]: Invalid user amstelecom from 83.15.28.2 Mar 10 14:30:50 router sshd[28518]: Invalid user dedlogistica from 83.15.28.2 Mar 10 14:30:51 router sshd[28520]: Invalid user dsantiago from 83.19.51.22 Mar 10 14:30:52 router sshd[28522]: Invalid user marcia from 83.15.28.2 Mar 10 14:30:54 router sshd[28524]: Invalid user consultoria from 83.15.28.2 Mar 10 14:30:55 router sshd[28526]: Invalid user primaveras from 83.15.28.2 Mar 10 14:30:56 router sshd[28528]: Invalid user salvatore from 83.19.51.22 Mar 10 14:30:58 router sshd[28530]: Invalid user comerciais from 83.15.28.2 Mar 10 14:30:59 router sshd[28532]: Invalid user cartas from 83.19.51.22 Mar 10 14:31:00 router sshd[28534]: Invalid user carta from 83.15.28.2 Mar 10 14:31:01 router sshd[28536]: Invalid user moralez from 83.15.28.2 Mar 10 14:31:10 router sshd[28538]: Invalid user nieves from 83.19.51.22 Mar 10 14:31:11 router sshd[28540]: Invalid user sol from 83.15.28.2 Mar 10 14:31:12 router sshd[28542]: Invalid user perla from 83.15.28.2 Mar 10 14:31:13 router sshd[28544]: Invalid user rocio from 83.19.51.22 Mar 10 14:31:15 router sshd[28546]: Invalid user simon from 83.19.51.22 Mar 10 14:31:16 router sshd[28548]: Invalid user sergio from 83.19.51.22 Mar 10 14:31:17 router sshd[28550]: Invalid user altagracia from 83.15.28.2 Mar 10 14:31:19 router sshd[28552]: Invalid user piedad from 83.19.51.22 ........ Now I try svn rev. 85 with: router:~/sshguard_svn_090310/sshguard/src# ./sshguard -d -a 2 -b 1:/var/cache/sshguard/blacklist -- Leonid Shulov <Leo...@en...> Entropic Communications Israel |
|
From: Greg P. <gre...@hc...> - 2009-03-10 13:01:57
|
Hi, I am using the following parameters for sshguard (v1.3). I know the -p is huge and we dont mind blacklisting intruders for long periods. I noticed today in logwatch and from further testing that once we reach about 16 entries in the accumulated list for iptables that no further entries are being accepted. /usr/local/sbin/sshguard -a 2 -p 25920000 -s 1800 -w /etc/sshguard.whitelist Please review and let me know if you need more information or logs. I am wondering if there is a limit somewhere in the binary or if this is by design. Thanks, greg |