Difference between revisions of "OpenSSH"

From Fail2ban
Jump to: navigation, search
(Penalty for invalid user)
Line 27: Line 27:
  
 
A convincing argument against doing this says that it lets an attacker know whether or not a username is valid, and thus dramatically decreases the search space of a brute-force attack.
 
A convincing argument against doing this says that it lets an attacker know whether or not a username is valid, and thus dramatically decreases the search space of a brute-force attack.
 +
 +
== Log IP Addresses ==
 +
In your OpenSSH config (frequently /etc/ssh/sshd_config), include the line
 +
<pre>UseDNS no</pre>
  
 
[[Category:SSH]]
 
[[Category:SSH]]
 +
[[Category:Programs]]

Revision as of 12:39, 10 January 2012

OpenSSH (Open Secure Shell) is a set of free software computer programs providing encrypted communication sessions over a computer network using the SSH protocol. It was created as an open alternative to the proprietary Secure Shell software. The project is led by Theo de Raadt from Calgary, Alberta in Canada.

From Wikipedia, the free encyclopedia



  • Aug 14 11:52:00 i60p295 sshd[11437]: Failed password for illegal user test123 from ::ffff:123.123.123.123 port 51381 ssh2
  • Aug 14 11:57:59 i60p295 sshd[12365]: Failed publickey for toto from ::ffff:123.123.123.123 port 51332 ssh2


Failregex

The regular expressions below are proposed failregex for this software. Multiple regular expressions for failregex will only work with a version of Fail2ban greater than or equal to 0.7.6.

The tag <HOST> in the regular expressions below is just an alias for (?:::f{4,6}:)?(?P<host>\S+). The replacement is done automatically by Fail2ban when adding the regular expression. At the moment, exactly one named group host or <HOST> tag must be present in each regular expression.

Please, before editing this section, propose your changes in the discussion page first.


  • Authentication failure for .* from <HOST>
  • Failed [-/\w] for .* from <HOST>
  • ROOT LOGIN REFUSED .* FROM <HOST>
  • [iI](?:llegal|nvalid) user .* from <HOST>


Penalty for invalid user

sshdfilter has a penalty for invalid users. In other words, invalid users may get 2 attempts while invalid password for valid users get 5 attempts. How can that be done in fail2ban?

A convincing argument against doing this says that it lets an attacker know whether or not a username is valid, and thus dramatically decreases the search space of a brute-force attack.

Log IP Addresses

In your OpenSSH config (frequently /etc/ssh/sshd_config), include the line

UseDNS no