<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Got Security? You&#8217;re in Denial</title>
	<atom:link href="http://www.linux-mag.com/id/7729/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.linux-mag.com/id/7729/</link>
	<description>Open Source, Open Standards</description>
	<lastBuildDate>Sat, 05 Oct 2013 13:48:18 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1</generator>
	<item>
		<title>By: lotto software</title>
		<link>http://www.linux-mag.com/id/7729/#comment-185253</link>
		<dc:creator>lotto software</dc:creator>
		<pubDate>Tue, 10 Apr 2012 02:00:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-185253</guid>
		<description>Hello, Neat post. There&#039;s an issue together with your web site in internet explorer, could test this? IE nonetheless is the market chief and a huge portion of other people will leave out your fantastic writing due to this problem.</description>
		<content:encoded><![CDATA[<p>Hello, Neat post. There&#8217;s an issue together with your web site in internet explorer, could test this? IE nonetheless is the market chief and a huge portion of other people will leave out your fantastic writing due to this problem.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: wednai</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8009</link>
		<dc:creator>wednai</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8009</guid>
		<description>&lt;p&gt;Thank you for the article. I\&#039;m installing right now.&lt;/p&gt;
&lt;p&gt;It looks like the command \&quot;sudo ln -s /usr/share/denyhosts/daemon-control denyhosts\&quot; should be run from the directory \&quot;/etc/init.d\&quot;, but the article isn\&#039;t clear on this point.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Thank you for the article. I\&#8217;m installing right now.</p>
<p>It looks like the command \&#8221;sudo ln -s /usr/share/denyhosts/daemon-control denyhosts\&#8221; should be run from the directory \&#8221;/etc/init.d\&#8221;, but the article isn\&#8217;t clear on this point.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: dragonwisard</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8010</link>
		<dc:creator>dragonwisard</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8010</guid>
		<description>&lt;p&gt;Another solution is Single Packet Authentication.&lt;br /&gt;
http://www.cipherdyne.org/fwknop/&lt;/p&gt;
&lt;p&gt;Better, IMHO, because attacker can\&#039;t even &lt;em&gt;attempt&lt;/em&gt; to log-in...&lt;em&gt;even if they know the server exists&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Also, you should disable password authentication in favor of certificates which are much harder to brute-force.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Another solution is Single Packet Authentication.<br />
<a href="http://www.cipherdyne.org/fwknop/" rel="nofollow">http://www.cipherdyne.org/fwknop/</a></p>
<p>Better, IMHO, because attacker can\&#8217;t even <em>attempt</em> to log-in&#8230;<em>even if they know the server exists</em>.</p>
<p>Also, you should disable password authentication in favor of certificates which are much harder to brute-force.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: palov@bio.bas.bg</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8011</link>
		<dc:creator>palov@bio.bas.bg</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8011</guid>
		<description>&lt;p&gt;I\&#039;d better paly with \&quot;MaxStartups\&quot; in /etc/ssh/sshd_config (or wherever you choose to put the config file ;o) to hamper brute force attacks. And, probably, \&quot;PermitRootLogin without-password\&quot;...
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>I\&#8217;d better paly with \&#8221;MaxStartups\&#8221; in /etc/ssh/sshd_config (or wherever you choose to put the config file ;o) to hamper brute force attacks. And, probably, \&#8221;PermitRootLogin without-password\&#8221;&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: stevekerr</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8012</link>
		<dc:creator>stevekerr</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8012</guid>
		<description>&lt;p&gt;I\&#039;ve been using denyhosts for a few years; it has blocked 743 break-in attempts in the last year. Unlike the author, I have a fixed-ip with a DNS name. I wonder if that accounts for the higher (pro-rata) attack rate? I have my config set to block access to any address after 3 failed login attempts. I only have a single remotely accessible ssh account and, obviously, it is not root! As far as I know, no one has ever managed to break in to my system.&lt;/p&gt;
&lt;p&gt;My only question is: Does having lots of entries in hosts.deny cause a degradation in network performance? I ask this as denyhosts has a \&#039;purge\&#039; feature to remove blocked addresses once they reach a certain age. I have mine set to 1 year but I wonder if it should be less to improve network performance - bear in mind that hosts.deny is referenced for all network connections, not just ssh.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>I\&#8217;ve been using denyhosts for a few years; it has blocked 743 break-in attempts in the last year. Unlike the author, I have a fixed-ip with a DNS name. I wonder if that accounts for the higher (pro-rata) attack rate? I have my config set to block access to any address after 3 failed login attempts. I only have a single remotely accessible ssh account and, obviously, it is not root! As far as I know, no one has ever managed to break in to my system.</p>
<p>My only question is: Does having lots of entries in hosts.deny cause a degradation in network performance? I ask this as denyhosts has a \&#8217;purge\&#8217; feature to remove blocked addresses once they reach a certain age. I have mine set to 1 year but I wonder if it should be less to improve network performance &#8211; bear in mind that hosts.deny is referenced for all network connections, not just ssh.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: lugoteehalt</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8013</link>
		<dc:creator>lugoteehalt</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8013</guid>
		<description>&lt;p&gt;Sorry to be ignorant boys and girls but do you need this if you are not using ssh?
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Sorry to be ignorant boys and girls but do you need this if you are not using ssh?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: kmoffat</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8014</link>
		<dc:creator>kmoffat</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8014</guid>
		<description>&lt;p&gt;I\&#039;ve been using it for years, also with apparent success. No break ins to my knowledge, and I\&#039;m pretty sure I\&#039;d know. I run Debian on a static ip running several web services, apache, postscript, dovecot, sshd, drupal, etc. I, too, am curious if a long list if denies degrades performance.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>I\&#8217;ve been using it for years, also with apparent success. No break ins to my knowledge, and I\&#8217;m pretty sure I\&#8217;d know. I run Debian on a static ip running several web services, apache, postscript, dovecot, sshd, drupal, etc. I, too, am curious if a long list if denies degrades performance.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ibrado</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8015</link>
		<dc:creator>ibrado</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8015</guid>
		<description>&lt;p&gt;You might also want to run sshd on a random high port.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>You might also want to run sshd on a random high port.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: txtiger73</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8016</link>
		<dc:creator>txtiger73</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8016</guid>
		<description>&lt;p&gt;DenyHosts is a nice program, but it is limited to protecting against abusive SSH connections.&lt;/p&gt;
&lt;p&gt;I\&#039;ve gotten more mileage out of Fail2Ban because it handles multiple services (ssh, ftp, pop3, imap, smtp, www); offers multiple blocking methods (iptables, netfilter, TCP wrapper); is easily extensible (write your own filter patterns and include arbitrary log files); and automatically un-bans IP addresses.  This makes it more suitable for public servers that host a number of different services for multiple clients.&lt;/p&gt;
&lt;p&gt;Another simple trick is to rate limit connections in your firewall.  For example, this limits any IP address to 4 connections in 60 seconds:&lt;/p&gt;
&lt;p&gt;iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --update --seconds 60 --hitcount 4 --rttl --name SSH -j DROP
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>DenyHosts is a nice program, but it is limited to protecting against abusive SSH connections.</p>
<p>I\&#8217;ve gotten more mileage out of Fail2Ban because it handles multiple services (ssh, ftp, pop3, imap, smtp, www); offers multiple blocking methods (iptables, netfilter, TCP wrapper); is easily extensible (write your own filter patterns and include arbitrary log files); and automatically un-bans IP addresses.  This makes it more suitable for public servers that host a number of different services for multiple clients.</p>
<p>Another simple trick is to rate limit connections in your firewall.  For example, this limits any IP address to 4 connections in 60 seconds:</p>
<p>iptables -A INPUT -p tcp &#8211;dport 22 -m state &#8211;state NEW -m recent &#8211;update &#8211;seconds 60 &#8211;hitcount 4 &#8211;rttl &#8211;name SSH -j DROP</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: gromm</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8017</link>
		<dc:creator>gromm</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8017</guid>
		<description>&lt;p&gt;Why bother? Just edit /etc/hosts.allow and add the fixed IP addresses that *are* allowed to connect, rather than waiting for just anyone on the internet to try to abuse your servers. Need access from random internet cafes? Set up an SSH server in an unimportant location - like your house - and let it act as an intermediary gateway.&lt;/p&gt;
&lt;p&gt;You could also save an SSH key to a usb keychain that you have on your keyring (which is *always* on your person, right?) and disallow password authentication entirely. This is far more secure because the likelihood of anyone brute-forcing a DSA signature in your lifetime is smaller than winning the lotto 14 weeks in a row.&lt;/p&gt;
&lt;p&gt;These methods make password attempts go away entirely.&lt;/p&gt;
&lt;p&gt;Also, it\&#039;s pretty obvious that the author of this article has never even been a professional sysadmin. If you\&#039;re going to write about security, you should have some experience either in this profession, or as a security expert.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Why bother? Just edit /etc/hosts.allow and add the fixed IP addresses that *are* allowed to connect, rather than waiting for just anyone on the internet to try to abuse your servers. Need access from random internet cafes? Set up an SSH server in an unimportant location &#8211; like your house &#8211; and let it act as an intermediary gateway.</p>
<p>You could also save an SSH key to a usb keychain that you have on your keyring (which is *always* on your person, right?) and disallow password authentication entirely. This is far more secure because the likelihood of anyone brute-forcing a DSA signature in your lifetime is smaller than winning the lotto 14 weeks in a row.</p>
<p>These methods make password attempts go away entirely.</p>
<p>Also, it\&#8217;s pretty obvious that the author of this article has never even been a professional sysadmin. If you\&#8217;re going to write about security, you should have some experience either in this profession, or as a security expert.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ionutg</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8018</link>
		<dc:creator>ionutg</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8018</guid>
		<description>&lt;p&gt;How many hackers with fixed IP\&#039;s are there in this world? Your IP is changing, the hackers IP is changing ... you end up collecting his providers range of IPs. Then, after allm you might be more secure.&lt;/p&gt;
&lt;p&gt;Did anybody do any statistics on the number of attempts/denials per IP?
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>How many hackers with fixed IP\&#8217;s are there in this world? Your IP is changing, the hackers IP is changing &#8230; you end up collecting his providers range of IPs. Then, after allm you might be more secure.</p>
<p>Did anybody do any statistics on the number of attempts/denials per IP?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: tallship</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8019</link>
		<dc:creator>tallship</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8019</guid>
		<description>&lt;p&gt;Instead of depending upon logfiles, and, considering the fail2ban even states that there is \&#039;some\&#039; lag because of this, I\&#039;ve always been a portsentry fan. &lt;/p&gt;
&lt;p&gt;Portsentry, logcheck, logsentry, and hostsentry are part of the sentry tools package at sourceforge, and even though I like fail2ban I find that in a production environment I need something that is working in realtime.&lt;/p&gt;
&lt;p&gt;Be careful though, some parts of portsentry can be setup with hair triggers, and you need to make sure you have your exceptions in or else you may find yourself clearing out your /etc/hosts.deny and iptables for a few days until everything settles down.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Instead of depending upon logfiles, and, considering the fail2ban even states that there is \&#8217;some\&#8217; lag because of this, I\&#8217;ve always been a portsentry fan. </p>
<p>Portsentry, logcheck, logsentry, and hostsentry are part of the sentry tools package at sourceforge, and even though I like fail2ban I find that in a production environment I need something that is working in realtime.</p>
<p>Be careful though, some parts of portsentry can be setup with hair triggers, and you need to make sure you have your exceptions in or else you may find yourself clearing out your /etc/hosts.deny and iptables for a few days until everything settles down.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: engcheng</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8020</link>
		<dc:creator>engcheng</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8020</guid>
		<description>&lt;p&gt;Just change port number&lt;br /&gt;
-----------------------&lt;br /&gt;
just for sharing, from the record of my /var/log/auth.log, my fixed IP web server used to face at least 100 over brute force attacks per day via various geographical sources, and using all forms of login names from root to john to mary to oracle...&lt;/p&gt;
&lt;p&gt;I used to add the intruder\&#039;s IP to host.deny, buy again, their IP keep changing and I got a bit tired. So...&lt;/p&gt;
&lt;p&gt;I changed my SSH port to 1234 instead! and that really helps (in my case). Now, after a month of monitoring, I can proclaim I face no trace of brute force attacks. Alternatively, if you\&#039;re more technical advance, can try knockd.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Just change port number<br />
&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br />
just for sharing, from the record of my /var/log/auth.log, my fixed IP web server used to face at least 100 over brute force attacks per day via various geographical sources, and using all forms of login names from root to john to mary to oracle&#8230;</p>
<p>I used to add the intruder\&#8217;s IP to host.deny, buy again, their IP keep changing and I got a bit tired. So&#8230;</p>
<p>I changed my SSH port to 1234 instead! and that really helps (in my case). Now, after a month of monitoring, I can proclaim I face no trace of brute force attacks. Alternatively, if you\&#8217;re more technical advance, can try knockd.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: txtiger73</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8021</link>
		<dc:creator>txtiger73</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8021</guid>
		<description>&lt;p&gt;tallship -- I respect your opinion and agree that real-time monitoring is a great feature.&lt;/p&gt;
&lt;p&gt;True real-time reaction requires deep packet inspection.  The defensive system must have an application-level knowledge of the protocols and up-to-date attack signatures.  It also introduces a significant performance impact, especially when the host is under stress or attack from multiple sources.&lt;/p&gt;
&lt;p&gt;We use Fail2Ban in daemon mode.  After adjusting our log file buffering, we see response times in the 1-2 second range.  Since we also implement rate limiting on SSH, FTP, POP3, IMAP, and SMTP services, an attacker\&#039;s window of opportunity is fairly limited.&lt;/p&gt;
&lt;p&gt;I considered  Trisentry (PortSentry, LogSentry, HostSentry) three years ago.  Here are my concerns:&lt;/p&gt;
&lt;p&gt;- The package hasn\&#039;t been updated since May 2003.  Seven years is a LONG time in the security world.&lt;/p&gt;
&lt;p&gt;- FreeBSD and several Linux distros have dropped third-party maintenance in favor of more active projects.&lt;/p&gt;
&lt;p&gt;- PortSentry\&#039;s signatures are hard-coded in the base C code.  The open source scanning tool, nmap, provided workarounds for PortSentry five years ago.&lt;/p&gt;
&lt;p&gt;- Logcheck\&#039;s pattern matching is fairly limited -- simple keywords with wildcards -- no regular expressions.  That makes hacking your own signatures unnecessarily difficult.&lt;/p&gt;
&lt;p&gt;- The package analogous to DenyHosts and Fail2Bail -- HostSentry -- hasn\&#039;t been publicly available since Cisco acquired Psionic Technologies in late 2002.  That leaves us without the ability to review warnings from the applications themselves (especially useful with web applications).&lt;/p&gt;
&lt;p&gt;- While watching for port scans can provide some forewarning, there is no guarantee a subsequent attack will be immediate.  On our production systems, we see port scans occur up to a week prior an attack.  Blocking IP addresses for extended lengths of time -- especially proxy or gateway servers -- causes far more harm than good.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>tallship &#8212; I respect your opinion and agree that real-time monitoring is a great feature.</p>
<p>True real-time reaction requires deep packet inspection.  The defensive system must have an application-level knowledge of the protocols and up-to-date attack signatures.  It also introduces a significant performance impact, especially when the host is under stress or attack from multiple sources.</p>
<p>We use Fail2Ban in daemon mode.  After adjusting our log file buffering, we see response times in the 1-2 second range.  Since we also implement rate limiting on SSH, FTP, POP3, IMAP, and SMTP services, an attacker\&#8217;s window of opportunity is fairly limited.</p>
<p>I considered  Trisentry (PortSentry, LogSentry, HostSentry) three years ago.  Here are my concerns:</p>
<p>- The package hasn\&#8217;t been updated since May 2003.  Seven years is a LONG time in the security world.</p>
<p>- FreeBSD and several Linux distros have dropped third-party maintenance in favor of more active projects.</p>
<p>- PortSentry\&#8217;s signatures are hard-coded in the base C code.  The open source scanning tool, nmap, provided workarounds for PortSentry five years ago.</p>
<p>- Logcheck\&#8217;s pattern matching is fairly limited &#8212; simple keywords with wildcards &#8212; no regular expressions.  That makes hacking your own signatures unnecessarily difficult.</p>
<p>- The package analogous to DenyHosts and Fail2Bail &#8212; HostSentry &#8212; hasn\&#8217;t been publicly available since Cisco acquired Psionic Technologies in late 2002.  That leaves us without the ability to review warnings from the applications themselves (especially useful with web applications).</p>
<p>- While watching for port scans can provide some forewarning, there is no guarantee a subsequent attack will be immediate.  On our production systems, we see port scans occur up to a week prior an attack.  Blocking IP addresses for extended lengths of time &#8212; especially proxy or gateway servers &#8212; causes far more harm than good.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: martinladner</title>
		<link>http://www.linux-mag.com/id/7729/#comment-8022</link>
		<dc:creator>martinladner</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7729/#comment-8022</guid>
		<description>&lt;p&gt;I found sshblack helpful.  It\&#039;s a perl program that can be used to block IP addresses after N bad login attempts and then automatically unblock them after N days.  In my case, the file servers were public-facing to serve many customers who did not use consistent IP addresses and weren\&#039;t technically savvy; so, I couldn\&#039;t use a whitelist or play with port numbers.  I set up set up shell scripts to ease its interaction with hosts.deny and to monitor sshblack (to bring it back on line when it dies).  sshblack works by monitoring authlog and maintaining a list of blocks and failed login attempts.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>I found sshblack helpful.  It\&#8217;s a perl program that can be used to block IP addresses after N bad login attempts and then automatically unblock them after N days.  In my case, the file servers were public-facing to serve many customers who did not use consistent IP addresses and weren\&#8217;t technically savvy; so, I couldn\&#8217;t use a whitelist or play with port numbers.  I set up set up shell scripts to ease its interaction with hosts.deny and to monitor sshblack (to bring it back on line when it dies).  sshblack works by monitoring authlog and maintaining a list of blocks and failed login attempts.</p>
]]></content:encoded>
	</item>
</channel>
</rss>