Cosc 5/4765 Protecting against ssh attacks And is this secure?

Slides:



Advertisements
Similar presentations
© Leaf Solutions, LLC. All Rights Reserved What’s New in Everett Microsoft.Net V1.1.
Advertisements

Distributed Storage March 12, Distributed Storage What is Distributed Storage?  Simple answer: Storage that can be shared throughout a network.
1 Anti Virus vs virus System i-Specific Anti-Virus Product Ali ameen al said.
Investigating Malicious Software Steve Romig The Ohio State University April 2002.
Welcome to the MIRC & NoName Script Tutorial Created by Buzz & Jet 1/31.
PUSH PUBLISHING POWER. Session Scope What is dotCMS Push Publishing How to set it up How it works & what can go wrong How to troubleshoot.
How (not) to use your firewall Jurjen N.E. Bos Information Security Consultant.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
CS 333 Introduction to Operating Systems Class 18 - File System Performance Jonathan Walpole Computer Science Portland State University.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
TRIRIGA Anywhere 10.4 Beta Registration Steps
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Format Scandisk Defragmentation Antivirus Compression Software
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
PacNOG 6: Nadi, Fiji Installing Ubuntu Server 9.04 Hervey Allen Network Startup Resource Center.
Installing Active Directory on Windows Server 2008 R2 Installing Active Directory on a fresh Windows Server 2008 R2 machine in a home network. These instructions.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Troubleshooting Guide for Network Hard Disk. Model - NH-200.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Introduction to Group Policy
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
CSN08101 Digital Forensics Lecture 1B: Essential Linux and Caine Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
How KeePass password safe can save you time and energy
Geo CE-XM ch 4 Edited 10/14/05 1 The XM is the newest of the rovers, and unlike other units, it comes with software installed on the unit as well as using.
Using School fusion A great interactive tool to aid in communication for students, parents and YOU!!! Property of TSVest 2006.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Modification of Pktfilter tool 10/9/2015Pktfilter modification - Brad Baker1 Brad Baker CS591 Spring 2007 Term project.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
Security at NCAR David Mitchell February 20th, 2007.
An Intro to Concurrent Versions System (CVS) ECE 417/617: Elements of Software Engineering Stan Birchfield Clemson University.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
August 2007 AIMS Coordinators Meeting SQL Server 2005 & ArcSDE 9.2 Scott Rice GIS DBA.
Live Free or PI Hard Cohner Marker, Spencer Johnson, Daryl Andes Image:
Creating Programs on UNIX This term you can create programs on UNIX or you can create programs using a C++ compiler on your PC. This set of slides steps.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Module 8 : Configuration II Jong S. Bok
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Your friend, Bluestem. What is Bluestem? “Bluestem is a software system which enables one or more high-security SSL HTTP servers in a domain (entrusted.
CMap Version 0.16 Ben Faga. CMap CMap Version 0.16 Bug fixes and code optimizations More intuitive menu system Asynchronous loading of comparative map.
1 MSTE Visual SourceSafe For more information, see:
How to use WS_FTP A Step by Step Guide to File Transfer.
Finding a PersonBOS Finding a Person! Building an algorithm to search for existing people in a system Rahn Lieberman Manager Emdeon Corp (Emdeon.com)
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
(1) Introduction to Continuous Integration Philip Johnson Collaborative Software Development Laboratory Information and Computer Sciences University of.
(1) Introduction to Continuous Integration Philip Johnson Collaborative Software Development Laboratory Information and Computer Sciences University of.
SQL SERVER 2008 Installation Guide A Step by Step Guide Prepared by Hassan Tariq.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Day 15 Apache. Being a web server Once your system is correctly connected to the network, you could be a web server. –When you go to a web site such as.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Log Shipping, Mirroring, Replication and Clustering Which should I use? That depends on a few questions we must ask the user. We will go over these questions.
VMware Certified Professional 6-Data Center Virtualization Beta 2V0-621Exam.
June 1, 2004© Matt Bishop [Changed by Hamid R. Shahriari] Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Securing your network But still be able to access it Hugh Mahon.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Jonathan Walpole Computer Science Portland State University
Configuring ALSMS Remote Navigation
Common Methods Used to Commit Computer Crimes
How to Upgrade Your Geant4 Release
Dynamic DNS support for EGI Federated cloud
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Elizabeth Liner Lab of Things.
Presentation transcript:

Cosc 5/4765 Protecting against ssh attacks And is this secure?

Protecting against ssh attacks The Idea: –1. Stop script kiddies constant attacks against the ssh server –2. Stop/slow down password cracking via ssh. –IE make things more secure. Or at least this is the plan. The Plan: –giving a number of failed login attempts from a given IP in a given time, block them for a period of time (or forever).

SSH “Religious” issues. The extreme “Right” ssh people, believe that the only way to login is via –public/private key login only. –NO Passwords allowed. The problems: –the keys must be installed before it can be used. Every machine and user most have those keys –Can you see the problems here?

How? Install a program to check the logs –DaemonShield or something like it. or watch the tcp connections –PortSentry or something like it. Write my own?! –Not happening.

Implementation PortSentry turns out to not work and to complex to fix. Move to the “simpler” concept of using the failed logins via the logs. –Get DaemonShield (from sourceforge)‏ First problem: Not being maintained anymore. Second problem: Still beta, but manageable. But is Redhat Ent compliant. –uses Python.

DaemonShield Simple program –written in Python. –Pretty configurable Set how often to check the logs (every 5 seconds)‏ How long to into history to use (30 minutes)‏ How many failures before blocking (2 is default)‏ How long offending IP is block (1 hour is default)‏ So if an user in the last 30 minutes fails to login twice, they their ip is blocked for 1 hour. –Compile and install

DaemonShield (2)‏ –Configured up Change to 5 minutes history, 4 logins failures and blocked for 30 minutes add a couple of other things. See Demo –and started it. Testing (not a production system)‏ Fail to login from a system –only 2 failed login and get blocked (?)‏ –wait 10 minutes try again, except still blocked Works except… –Says I have 4 failed logins in the last 0 minutes –That’s a problem.

fixing problems. Check and reconfigure daemonshield –still no joy, system is still blocked (45 minutes later!) with only 2 failed logins check logs –SSHD has registered 4 failed logins! –SSHD registered 2 failed logins with time stamps of GMT (+7 hours) and 2 with MDT

The Hunt Search the Internet… Oh joy! findings and Multiple known sshd bugs 1. sshd has been put into a chroot –problem, doesn’t understand Timezone data correctly – Due to a bug fix where sshd was not loggin correctly, a new bug was introduced causing it to log some things twice! –both the parent process and child process now log. »And (I think) the child doesn’t get the Timezone correct.

Attempting to fix First the duplicate logging can’t be fixed by me –Wait for sshd people to issue fix. –double failed login number in daemonshield Hope I remember when sshd is patched.

Attempting to fix (2)‏ Second, timezone issues. –multiple fixes for this one copy the /etc/timezone file into /var/empty/ssh/etc/ directory –Consistency problems will happen! –TZdata is updated every couple of months, so these files will get out sync Link /var/empty/sshd/etc/localtime to /etc/timezone –Soft link? –Hard link?

Linking So sshd is chroot in it’s own directories –Linking either through soft link localtime --> /etc/localtime –Hard link creates a second inode link to the /etc/localtime file And /etc/localtime is a softlink to the correct timezone as well. What problems have been created?

One more issue DaemonShield –Adds an extra logging feature So all attempts from offending IP while it is blocked will now be logged Adds to the log files and makes them bigger Not really what I want. –Edit Python Remove the lines to create the logging in iptables

Update SSHD fixed logging –Only logs once for every attempt timezone issues. –On every startup sshd now copies the /etc/timezone file into /var/empty/ssh/etc/ directory

Now the real question. By doing all of this How we made the system more secure?

Q A &