[HamWAN PSDR] Recently connected... Now being attacked?

Bart Kus me at bartk.us
Wed Jan 1 13:25:20 PST 2014


Yeah, I didn't think this through enough when I suggested an alternate 
port.  I believe Nigel has at least one ssh-based network health scanner 
implemented so far, and that will only grow.

One more thing I can think of is to only have accounts which feature 
ssh-keys.  That way all the failed logins are not a problem since 
password auth is impossible with ssh-keys configured.  Only if the 
attacker has the corresponding private key would they be able to login.

--Bart

On 1/1/2014 10:12 AM, Nigel Vander Houwen wrote:
> Hello Jason,
>
> I'm actually going to have to contradict Bart on one aspect here, and 
> strongly suggest moving ssh back to the original port. The way hamwan 
> is designed for the "shared admin" model where myself and a couple 
> other individuals who are the admins for the network, doesn't agree 
> well with devices having non-standard configs.
>
> Not that changing a port in and of itself is a bad idea, I've done it 
> a number of times, but it makes the job of the admins a nightmare when 
> trying to manage the network and figure out what port ssh is running 
> on for User A's modem.
>
> Can I suggest instead that you create a firewall rule that limits SSH 
> to the hamwan address space when coming in over the wireless 
> interface? Something like
>
> ipfirewallfilteraddaction=accept dst-port=22 
> src-address=44.24.240.0/20 <http://44.24.240.0/20> protocol=tcp 
> chain=input in-interface=w0
>
> is probably along the lines of what you'd be looking at. This still 
> limits the attempts at your modem, but still allows for the admins to 
> update or configure your modem as needed.
>
> P.S. Welcome to the network!
>
> Thanks!
>
> Nigel
>
> K7NVH
>
>
>
> On Mon, Dec 30, 2013 at 12:39 PM, Jason Maher <jason at jmaher.org 
> <mailto:jason at jmaher.org>> wrote:
>
>     Thanks for the suggestions guys,
>
>     I changed the ssh port from the default and installed a SSL
>     certificate.
>
>     Bart:
>     I discovered the firewall rules on Mikrotik's wiki after a little
>     Googling.
>     Here is the URL:
>     http://wiki.mikrotik.com/wiki/Bruteforce_login_prevention
>
>     No need to block anything on your edge routers. "Kill all
>     internet", I like that! :-)
>
>     --Jason
>     K7JMM
>
>
>     On 12/29/2013 12:39 PM, Daniel Luechtefeld wrote:
>
>         Having worked as a security-focused network engineer at a
>         wireless ISP, I can tell you that it's very likely an
>         automated attack against the whole address block in which you
>         reside.
>         One way to harden yourself is to deploy two-factor
>         authentication: password and SSL certificate.
>         73, Daniel K7DGL
>
>
>
>
>     _______________________________________________
>     PSDR mailing list
>     PSDR at hamwan.org <mailto:PSDR at hamwan.org>
>     http://mail.hamwan.org/mailman/listinfo/psdr_hamwan.org
>
>
>
>
> -- 
> Nigel Vander Houwen
>
>
> _______________________________________________
> PSDR mailing list
> PSDR at hamwan.org
> http://mail.hamwan.org/mailman/listinfo/psdr_hamwan.org

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.hamwan.net/pipermail/psdr/attachments/20140101/0683a16c/attachment.html>


More information about the PSDR mailing list