Security Incidents mailing list archives

Re: SSH bruteforce on its way...


From: Russell Fulton <r.fulton () auckland ac nz>
Date: Tue, 25 Oct 2005 09:17:07 +1300



Justin wrote:
Jouser,

Nah, there were some exploits a while back that took advanteage in
some timing flaws in the SSHd that let attackers determin valid
usernames.
Would you please provide some supporting references.  I can not find any
evidence of existing timing attacks against openssh.  In fact Openssh
goes to some trouble to defeat such attacks.

While on this thread, one effective counter measure against brute force
password attacks is to use decent passwords which everyone should be
doing anyway.  We have lost about 3 systems here to ssh brute force
attacks and in all cases the systems were in serious breach of our
policies (which are not particularly draconian).

In one case I did feel a bit sorry for the victims, they had installed a
third party package that created an account with an insecure password
and they never noticed.  A good case for simple monitoring script like
the one that is run nightly on OBSD system that warns you about changes
in critical files.

Russell.


peace,
--Justin

On 21 Oct 2005 18:05:27 -0000, jouser () gmail com <jouser () gmail com> wrote:

I didn't think it was possible to determine valid usernames by themselves?  You either have a valid username AND 
password or not.



Current thread: