Displaying 4 results from an estimated 4 matches for "target_host".
2024 Jun 25
3
An Analysis of the DHEat DoS Against SSH in Cloud Environments
...testing with a local VM, and the results
are... interesting.
I installed openssh-SNAP-20240626.tar.gz on a fresh and fully-updated
Ubuntu Linux 24.04 LTS VM with 1 vCPU. While leaving the default sshd
options unchanged, I was able to reduce idle time to 0.0% using "./ssh-
audit.py --dheat=16 target_host".
Next, I increased the vCPUs to 4. The same ssh-audit command yielded
54% idle time (averaged over 60 seconds). That's still a lot of strain
on the target, despite the fact that the logs claim that the
PerSourcePenalties noauth:1 restriction was being triggered.
After that, I tried si...
2024 Jun 27
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
...couldn't
reproduce some of them, and I suspect I made a mistake during testing.
Being more careful this time, I set up another fully updated Ubuntu
24.04 VM with 4 vCPUs running openssh-SNAP-20240628.tar.gz with all
defaults unchanged.
When running using "ssh-audit.py --conn-rate-test=16 target_host", the
system idle time averaged over 60 seconds was 50%. The
/var/log/auth.log file grew 73MB in this time (nearly 400,000 lines
were messages produced by the new PerSourcePenalties logging in
sshd.c:627).
Next, I modified the logging in sshd.c:627 to always use
SYSLOG_LEVEL_DEBUG1 instead o...
2024 Jun 19
2
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Wed, 2024-06-19 at 09:19 -0400, chris wrote:
> real world example (current snapshot of portable on linux v. dheater)
Thanks for this. However, much more extensive testing would be needed
to show it is a complete solution. In my original research article, I
used CPU idle time as the main metric. Also, I showed that very low-
latency network links could bypass the existing countermeasures.
2011 Jun 02
1
Capturing ftp reponses
...ote host supports is ftp. What I want
to do is to capture the initial response that comes back from that
host before the user credentials are passed and log this
information.
I cannot seem to hit upon the right set of redirects to make this
happen. In my script I invoke ftp thus:
ftp -un "$TARGET_HOST" << EOS >> ${LOGGING_FILE} 2>&1
user $LOGON
dir
quit
EOS
When I connect to the host via ftp interactively from a session then
I see this:
Connected to host.domain.tld.
220 HP ARPA FTP Server [A0012H15] (C) Hewlett-Packard Co. 2000 [PASV
SUPPORT]
Remote system type is MPE...