[Triumf-linux-managers] brute-force ssh-login attacks

Kel Raywood kray at triumf.ca
Tue Feb 14 17:29:05 PST 2017


There is currently an issue with the TRIUMF perimeter-firewall that has 
resulted in a failure of the system that blocks the source brute-force 
ssh-login attempts [see below for the background].

So if your Linux machine(s) accepts external ssh connections, you will 
be seeing a significant increase in the number of ssh-login failures.  
They're recorded locally in /var/log/secure and /var/log/btmp .  The 
latter is read by the command "lastb" .   The network team is working on 
resolving the problem,  but in the meantime, it is good to double check 
the security of Linux (or MacOS-X) machines that you manage.

The attacks focus mostly on the root account so if your machine allows 
external ssh connections, then we strongly recommend that you configure 
sshd to disallow password authentication for root.  Use ssh-key or 
certificate-based logins instead.  Of course, it's good to do this for 
all accounts but this is often not feasible.

Another option is to block all externally-originating ssh-connections, 
and use the TRIUMF VPN service for making a remote connection.  Again, 
we realise that this is not always feasible because you have off-site 
collaborators without permission to use the TRIUMF VPN service.

*Background*

For many years, TRIUMF has had a system for reducing the risk of 
brute-force ssh intrusion.  Many Linux desktop PCs and almost all Linux 
servers at TRIUMF are configured to send notices of ssh-login failures 
to syslog.triumf.ca .  A process running on that machine can trigger 
injection of a rule into the perimeter-firewall to block 
source-addresses from which a high rate of login failures has been seen.

--
Kelvin Raywood
TRIUMF Information-Systems Technology dept.



More information about the Triumf-linux-managers mailing list