LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-28-2002, 11:14 PM   #1
[BHBS]=TK
Member
 
Registered: Aug 2001
Location: Salt Lake City, UT
Distribution: REDHAT 7.1
Posts: 32

Rep: Reputation: 15
Post Sshd Piercing


Has anyone ever seen something like this? The IP resolved to a middle school in South Korea.

Mar 28 19:38:43 localhost sshd[3909]: scanned from 211.248.172.2 with SSH-1.0-SSH_Version_Mapper . Don't panic.
Mar 28 19:38:58 localhost sshd[3908]: Did not receive identification string from 211.248.172.2.
Mar 28 19:41:35 localhost sshd[3910]: Disconnecting: Corrupted check bytes on input.
Mar 28 19:47:58 localhost sshd[3911]: Disconnecting: Corrupted check bytes on input.
 
Old 03-29-2002, 03:44 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
It's a version scanner, it could be used to determine if your Sshd version is vulnerable to a CRC-32 or other attack. Increased scanning seems to have been started around dec of last yr.

These are some steps to tighten Sshd access:
- upgrade Sshd to a 3x version to shield from 2.9x flaws,
- make sure sshd_config only lists "Protocol 2" and not fallback capacity like "Protocol 2,1",
- use (if compiled with support for) TCP wrappers to allow only specific hosts access, or use an "ALL EXCEPT" statement if you get hit more by some IP ranges but can't add restrictions on allowed ip ranges,
- add firewall blocking rule, matching the previous step. (Could add sending RST: no daemon listening on port),
- restrict user access in sshd_config
- Add snort (compile --with-flexresp) with Guardian to block access when a "CRC32" signature alert is found.

IMO the 1st 3 steps should be mandatory, and the last 3 optional cuz they are too restrictive.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Sshd TimeBandit Linux - Software 4 06-20-2005 11:00 AM
sshd x 3 Martin Strand Linux - Newbie 1 05-11-2005 04:45 PM
Help sshd kicken Linux - Networking 2 05-25-2004 07:15 AM
Enabling SSH in mandrake 9.2 - sshd vs. sshd-xinetd DogTags Linux - Newbie 7 11-25-2003 12:17 PM
sshd kylo8787 Linux - Networking 4 04-15-2002 05:14 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:15 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration