Displaying 20 results from an estimated 20 matches for "persourcepenalties".
2024 Jul 03
0
[Bug 3705] New: Disk space exhaustion from PerSourcePenalties logging
https://bugzilla.mindrot.org/show_bug.cgi?id=3705
Bug ID: 3705
Summary: Disk space exhaustion from PerSourcePenalties logging
Product: Portable OpenSSH
Version: -current
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: jte...
2024 Aug 01
0
ratelimiting for PerSourcePenalties logging
Hi,
A few people have requested rate-limiting for PerSourcePenalties logging.
These patches add it. Please give them a try if you're interested in this
feature.
-d
-------------- next part --------------
2024 Jun 25
3
An Analysis of the DHEat DoS Against SSH in Cloud Environments
...able to reduce idle time to 0.0% using "./ssh-
audit.py --dheat=16 target_host".
Next, I increased the vCPUs to 4. The same ssh-audit command yielded
54% idle time (averaged over 60 seconds). That's still a lot of strain
on the target, despite the fact that the logs claim that the
PerSourcePenalties noauth:1 restriction was being triggered.
After that, I tried simply flooding the target with open connections
without performing the DHEat attack ("ssh-audit.py --conn-rate-test=16
target_host"). This caused the 60-second average idle time to come all
the way down to 6%! Additionally,...
2024 Jun 18
2
Call for testing: openssh-9.8
...lly, lock out valid users (especially in attack scenarios)
> I'm somewhat hesitant to deploy in production without understanding
> this mechanism and testing results in a little more detail if
> available.
I suggest reading the documentation then:
https://man.openbsd.org/sshd_config.5#PerSourcePenalties
> overflow:mode
> Controls how the server behaves when max-sources4 or max-sources6
> is exceeded. There are two operating modes: deny-all, which
> denies all incoming connections other than those exempted via
> PerSourcePenaltyExemptList until a penalty expires, and per...
2024 Jun 19
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
In the upcoming v9.8 release notes I see "the server will now block
client addresses that repeatedly fail authentication, repeatedly
connect without ever completing authentication or that crash the
server." Has this new PerSourcePenalties config directive been tested
against the DHEat attack?
- Joe
On Thu, 2024-04-25 at 18:09 -0400, Joseph S. Testa II wrote:
> A few days ago, I published an article analyzing the susceptibility
> of
> the DHEat denial-of-service vulnerability against default OpenSSH
> settings in cl...
2024 Jun 27
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
...g openssh-SNAP-20240628.tar.gz with all
defaults unchanged.
When running using "ssh-audit.py --conn-rate-test=16 target_host", the
system idle time averaged over 60 seconds was 50%. The
/var/log/auth.log file grew 73MB in this time (nearly 400,000 lines
were messages produced by the new PerSourcePenalties logging in
sshd.c:627).
Next, I modified the logging in sshd.c:627 to always use
SYSLOG_LEVEL_DEBUG1 instead of SYSLOG_LEVEL_INFO. Re-running the above
test resulted in 73% average idle time and 8KB of log growth.
Lastly, from an m7i.2xlarge source EC2 instance in AWS, I targeted an
m7i.large in...
2024 Jul 12
1
[Bug 3709] New: PerSourceMaxStartups no longer works as advertised
https://bugzilla.mindrot.org/show_bug.cgi?id=3709
Bug ID: 3709
Summary: PerSourceMaxStartups no longer works as advertised
Product: Portable OpenSSH
Version: 9.8p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2024 Jun 19
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Tue, 18 Jun 2024, Joseph S. Testa II wrote:
> In the upcoming v9.8 release notes I see "the server will now block
> client addresses that repeatedly fail authentication, repeatedly
> connect without ever completing authentication or that crash the
> server." Has this new PerSourcePenalties config directive been tested
> against the DHEat attack?
Not explicitly but those attacks would trigger the "grace-exceeded"
path, so they should be detectable and penalisable.
-d
2024 Jun 19
2
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Wed, 2024-06-19 at 09:19 -0400, chris wrote:
> real world example (current snapshot of portable on linux v. dheater)
Thanks for this. However, much more extensive testing would be needed
to show it is a complete solution. In my original research article, I
used CPU idle time as the main metric. Also, I showed that very low-
latency network links could bypass the existing countermeasures.
2024 Jun 24
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On 6/19/24 4:11 PM, Joseph S. Testa II wrote:
> On Wed, 2024-06-19 at 09:19 -0400, chris wrote:
>> real world example (current snapshot of portable on linux v. dheater)
>
> Thanks for this. However, much more extensive testing would be needed
> to show it is a complete solution. In my original research article, I
> used CPU idle time as the main metric. Also, I showed that
2024 Jul 16
1
[Bug 3711] New: How do you defend against the D (HE) ater attack?
https://bugzilla.mindrot.org/show_bug.cgi?id=3711
Bug ID: 3711
Summary: How do you defend against the D (HE) ater attack?
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: security
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2024 Jun 18
1
Call for testing: openssh-9.8
On 6/17/2024 22:46, Damien Miller wrote:
> This release contains mostly bugfixes.
>
> New features
> ------------
>
> * sshd(8): add the ability to penalise client addresses that, for
> various reasons, do not successfully complete authentication.
> sshd(8) will now identify situations where the session did not
> authenticate as expected. These
2024 Jun 19
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
...eph S. Testa II wrote:
>
> > In the upcoming v9.8 release notes I see "the server will now block
> > client addresses that repeatedly fail authentication, repeatedly
> > connect without ever completing authentication or that crash the
> > server." Has this new PerSourcePenalties config directive been tested
> > against the DHEat attack?
>
> Not explicitly but those attacks would trigger the "grace-exceeded"
> path, so they should be detectable and penalisable.
>
> -d
real world example (current snapshot of portable on linux v. dheater)
Ju...
2024 Apr 25
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
A few days ago, I published an article analyzing the susceptibility of
the DHEat denial-of-service vulnerability against default OpenSSH
settings in cloud environments. I thought those on this list might be
interested:
https://www.positronsecurity.com/blog/2024-04-23-an-analysis-of-dheat-dos-against-ssh-in-cloud-environments/
A short summary: the default MaxStartup setting is fully ineffective
2024 Sep 15
2
Call for testing: OpenSSH 9.9
...well as the same set of %-tokens "Match Exec"
supports.
* sshd(8): add a sshd_config "RefuseConnection" option that, if set
will terminate the connection at the first authentication request.
* sshd(8): add a "refuseconnection" penalty class to sshd_config
PerSourcePenalties that is applied when a connection is dropped by
the new RefuseConnection keyword.
* sshd(8): add a "Match invalid-user" predicate to sshd_config Match
options that matches when the target username is not valid on the
server.
* ssh(1), sshd(8): update the Streamlined NTRUPrime...
2024 Jun 18
7
Call for testing: openssh-9.8
...* all: as mentioned above, the DSA signature algorithm is now
disabled at compile time.
* sshd(8): the server will now block client addresses that
repeatedly fail authentication, repeatedly connect without ever
completing authentication or that crash the server. See the
discussion of PerSourcePenalties below for more information.
Operators of servers that accept connections from many users, or
servers that accept connections from addresses behind NAT or
proxies may need to consider these settings.
* sshd(8): the server has been split into a listener binary, sshd(8),
and a per-sessio...
2024 Sep 20
0
Announce: OpenSSH 9.9 released
...well as the same set of %-tokens "Match Exec"
supports.
* sshd(8): add a sshd_config "RefuseConnection" option that, if set
will terminate the connection at the first authentication request.
* sshd(8): add a "refuseconnection" penalty class to sshd_config
PerSourcePenalties that is applied when a connection is dropped by
the new RefuseConnection keyword.
* sshd(8): add a "Match invalid-user" predicate to sshd_config Match
options that matches when the target username is not valid on the
server.
* ssh(1), sshd(8): update the Streamlined NTRUPrime...
2024 Sep 20
0
Announce: OpenSSH 9.9 released
...well as the same set of %-tokens "Match Exec"
supports.
* sshd(8): add a sshd_config "RefuseConnection" option that, if set
will terminate the connection at the first authentication request.
* sshd(8): add a "refuseconnection" penalty class to sshd_config
PerSourcePenalties that is applied when a connection is dropped by
the new RefuseConnection keyword.
* sshd(8): add a "Match invalid-user" predicate to sshd_config Match
options that matches when the target username is not valid on the
server.
* ssh(1), sshd(8): update the Streamlined NTRUPrime...
2024 Sep 22
0
Announce: OpenSSH 9.9 released
...well as the same set of %-tokens "Match Exec"
supports.
* sshd(8): add a sshd_config "RefuseConnection" option that, if set
will terminate the connection at the first authentication request.
* sshd(8): add a "refuseconnection" penalty class to sshd_config
PerSourcePenalties that is applied when a connection is dropped by
the new RefuseConnection keyword.
* sshd(8): add a "Match invalid-user" predicate to sshd_config Match
options that matches when the target username is not valid on the
server.
* ssh(1), sshd(8): update the Streamlined NTRUPrime...
2024 Sep 22
0
Announce: OpenSSH 9.9 released
...well as the same set of %-tokens "Match Exec"
supports.
* sshd(8): add a sshd_config "RefuseConnection" option that, if set
will terminate the connection at the first authentication request.
* sshd(8): add a "refuseconnection" penalty class to sshd_config
PerSourcePenalties that is applied when a connection is dropped by
the new RefuseConnection keyword.
* sshd(8): add a "Match invalid-user" predicate to sshd_config Match
options that matches when the target username is not valid on the
server.
* ssh(1), sshd(8): update the Streamlined NTRUPrime...