PDF SSH
PDF SSH
defenses
SSH
Common attacks against SSH
● Attempting to login as default users
● Brute-force password guessing
● Protocol attacks against v1
http://www.ciac.org/ciac/bulletins/m-017.shtml
Why worry about SSH in
particular?
● The service is commonly used and
generally can't be blocked at the
border.
● Successful compromises of SSH servers
are difficult to detect at a network
level.
● Often used to allow remote access to
large groups of hosts
● Enabled by default on some servers and
often overlooked
Things everybody can do
● Do not allow remote logins from the
root user.
● Use a software firewall. Block packets
that are not well-behaved. Examples:
packets with SYN bit set that aren't
part of a session, packets with both
SYN-FIN yet, etc. TCP wrappers are
better but aren't always available.
● Regularly audit your logs.
What about using different
ports?
If you want, but this isn't strong security.
Why not?