bugzilla-daemon at mindrot.org
2005-May-31  11:04 UTC
[Bug 1049] Variable delay in password logins to fight dictionary attacks
http://bugzilla.mindrot.org/show_bug.cgi?id=1049
           Summary: Variable delay in password logins to fight dictionary
                    attacks
           Product: Portable OpenSSH
           Version: 3.8.1p1
          Platform: ix86
        OS/Version: Linux
            Status: NEW
          Severity: enhancement
          Priority: P2
         Component: sshd
        AssignedTo: bitbucket at mindrot.org
        ReportedBy: heikki at indexdata.dk
I have seen many dictionary attacks on my ssh servers. I was thinking of a
simple way to slow
them down: Add a small delay to the login. Start with a half second, and double
every time a
password-based (or other) login fails from the same IP address, up to some
limit.
 
This requires keeping a small array in memory, with each IP address that has
recently failed
to log in, delay time, and a time stamp when a login from them will be allowed
again.
 
In a similar way, it should be possible to keep a time-out for each username,
again doubling it.
At a login, take the greater of the two delays.  
 
Both tables can be limited to (say) 10000 entries, and if they flow over,
discard oldest entries.
Actually, this could also be used for logins that do not try passwords, in case
someone tries to
brute-force something else... 
 
Possibly this is a well-known theory, and there is a well-known reason not to
use it. If so, I'd
like to hear about it.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2005-Jun-03  02:13 UTC
[Bug 1049] Variable delay in password logins to fight dictionary attacks
http://bugzilla.mindrot.org/show_bug.cgi?id=1049
djm at mindrot.org changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |WONTFIX
------- Additional Comments From djm at mindrot.org  2005-06-03 12:13 -------
This doesn't fit well with ssh's process model and would add quite a bit
of
complexity for pretty marginal gain. On the other hand, it could easily be
implemented as a small program that watches logs and sets up firewall rules.
Please see the extended discussion on this topic on the
openssh-unix-dev at mindrot.org mailing list.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2005-Jun-03  02:21 UTC
[Bug 1049] Variable delay in password logins to fight dictionary attacks
http://bugzilla.mindrot.org/show_bug.cgi?id=1049 ------- Additional Comments From dtucker at zip.com.au 2005-06-03 12:21 ------- BTW it can also be implemented in the underlying auth systems that sshd uses, eg LinuxPAM has pam_fail_delay. See: http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/pam_appl-3.html#the-failure-delay-function and for a way to set this in the PAM config files: http://www.zip.com.au/~dtucker/patches/pam_faildelay.c ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.