I recommend Single Packet Authentication or Port Knocking for use in conjunction with your SSH service.


On Mon, Mar 17, 2008 at 8:37 AM, Mike Bydalek <mbydalek@compunetconsulting.com> wrote:
Jon M. Hanson wrote:
> Josef Lowder wrote:
>> .
>> Are Linux boxes vulnerable to be used by botnets?
>>
>> This article in USA Today is frightening.
>>
>> http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
>>
>>
> Probably at least once a day my Linux box that I have co-located is
> probed for a weak password /account through SSH. I'm not sure what
> they would do to the system if they got in and I'm not going to find
> out. When I see an SSH probe happen I track down who owns the IP and
> report it. I also nmap the IP to see what services are running on the
> system.
That seems like too much work =P  Most of the probes, ssh attacks, etc.
that I see are from foreign countries and I really don't see much
benefit in reporting them.  What I do on all my servers is use 2 little
tools to help stop these automated attacks: DenyHosts
(http://denyhosts.sourceforge.net/) and PortSentry
(http://sourceforge.net/projects/sentrytools/)  With these 2, a high
number (I would say 99% but then I have no proof to back it up) of
attacks are immediately stopped in their tracks.  If someone is doing a
port scan on your entire server, do you *really* think they're doing it
for a good reason?

-Mike
---------------------------------------------------
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss



--
"A man is defined by the questions that he asks; and the way he goes about finding the answers to those questions is the way he goes through life."