[Gllug] ssh brute force attacks
Hari Sekhon
hpsekhon at googlemail.com
Tue Dec 9 09:06:14 UTC 2008
Nix wrote:
> On 8 Dec 2008, Hari Sekhon said:
>
>> 1) You still end up with lots of garbage in your logs from failed
>> attempts by not preventing attempts
>>
>
> Ooh dear. Use a decent syslogd like syslog-ng to filter them out.
>
Already done, but filtering out this stuff is a terrible thing to do. I
have built log servers with complex stratification of logs and
monitoring rule sets but I would never, ever just ignore garbage in the
logs by filtering it out at source or sending it to a destination I
don't check! That's almost as bad as not having logs because you
lose/discard part of your information. The best thing is to investigate
and prevent problem logs for tighter administration.
>> 2) You may need to use passwords at some time, because not everyone will
>> have keys or can be trusted to properly secure their keys etc...
>>
>
> If someone doesn't have a key, give him one. If he won't accept one, he
> can't log in. It's that simple. Not everyone can be trusted to secure
> their keys? Then passphrase them: if they can't keep the passphrase
> secure, then they can't keep their passwords secure either.
>
I think keys are the way to go, I use them extensively myself, and I
have forced this in some usage cases, not sure about all cases though, I
think it may depend on the users, but you have good points here.
-h
--
Hari Sekhon
Always open to interesting opportunities
http://www.linkedin.com/in/harisekhon
--
Gllug mailing list - Gllug at gllug.org.uk
http://lists.gllug.org.uk/mailman/listinfo/gllug
More information about the GLLUG
mailing list