<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	
	>
<channel>
	<title>
	Comments on: Mitigating SSH Brute Force Attacks with ipt_recent	</title>
	<atom:link href="/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/feed/" rel="self" type="application/rss+xml" />
	<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/</link>
	<description>Software Engineer and Consultant</description>
	<lastBuildDate>Sat, 29 Oct 2016 01:51:03 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Yaz Okulu		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-57736</link>

		<dc:creator><![CDATA[Yaz Okulu]]></dc:creator>
		<pubDate>Thu, 13 Mar 2008 18:28:19 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-57736</guid>

					<description><![CDATA[does anyone knows if there is any other information about this subject in other languages?]]></description>
			<content:encoded><![CDATA[<p>does anyone knows if there is any other information about this subject in other languages?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Rommidze		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-50697</link>

		<dc:creator><![CDATA[Rommidze]]></dc:creator>
		<pubDate>Wed, 14 Feb 2007 15:29:51 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-50697</guid>

					<description><![CDATA[There is also another one, but more user friendly way to protect ssh, is to use pam-abl:
http://tech.tolero.org/blog/en/linux/ssh-password-brute-force-protection]]></description>
			<content:encoded><![CDATA[<p>There is also another one, but more user friendly way to protect ssh, is to use pam-abl:<br />
<a href="http://tech.tolero.org/blog/en/linux/ssh-password-brute-force-protection" rel="nofollow ugc">http://tech.tolero.org/blog/en/linux/ssh-password-brute-force-protection</a></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Juergen Kreileder		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-18928</link>

		<dc:creator><![CDATA[Juergen Kreileder]]></dc:creator>
		<pubDate>Sun, 22 Oct 2006 16:56:25 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-18928</guid>

					<description><![CDATA[Yeah, I&#039;ve seen that &lt;em&gt;Limit&lt;/em&gt; has been included in the upstream version some time ago. I&#039;ll add a note to the article.]]></description>
			<content:encoded><![CDATA[<p>Yeah, I&#8217;ve seen that <em>Limit</em> has been included in the upstream version some time ago. I&#8217;ll add a note to the article.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Daniel Andersson		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-18925</link>

		<dc:creator><![CDATA[Daniel Andersson]]></dc:creator>
		<pubDate>Sun, 22 Oct 2006 16:38:22 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-18925</guid>

					<description><![CDATA[I&#039;ve been using this tip successfully for, I don&#039;t know, about a year now. A couple of hours ago when I ran a &quot;apt-get dist-upgrade&quot; on my Debian Unstable-machine, Shorewall was upgraded and after that unable to start. It reported an error regarding this very tip.

The solution was found a while later. In the changelog (which I read during installation, just not carefully enough :-) ) it says:

&quot;&quot;
    The &#039;Limit&#039; action is now a builtin. If you have &#039;Limit&#039; listed in
    /etc/shorewall/actions, remove the entry. Also remove the files
    /etc/shorewall/action.Limit and/or /etc/shorewall/Limit if you have
    them.
&quot;&quot;
http://www1.shorewall.net/pub/shorewall/development/3.3/shorewall-3.3.3/releasenotes.txt

The answer lies here though: http://www.shorewall.net/PortKnocking.html#Limit . In other words: out with the old, in with the new. On the same page, further up, there is a replacement for the Whitelist-action as well.]]></description>
			<content:encoded><![CDATA[<p>I&#8217;ve been using this tip successfully for, I don&#8217;t know, about a year now. A couple of hours ago when I ran a &#8220;apt-get dist-upgrade&#8221; on my Debian Unstable-machine, Shorewall was upgraded and after that unable to start. It reported an error regarding this very tip.</p>
<p>The solution was found a while later. In the changelog (which I read during installation, just not carefully enough :-) ) it says:</p>
<p>&#8220;&#8221;<br />
    The &#8216;Limit&#8217; action is now a builtin. If you have &#8216;Limit&#8217; listed in<br />
    /etc/shorewall/actions, remove the entry. Also remove the files<br />
    /etc/shorewall/action.Limit and/or /etc/shorewall/Limit if you have<br />
    them.<br />
&#8220;&#8221;<br />
<a href="http://www1.shorewall.net/pub/shorewall/development/3.3/shorewall-3.3.3/releasenotes.txt" rel="nofollow ugc">http://www1.shorewall.net/pub/shorewall/development/3.3/shorewall-3.3.3/releasenotes.txt</a></p>
<p>The answer lies here though: <a href="http://www.shorewall.net/PortKnocking.html#Limit" rel="nofollow ugc">http://www.shorewall.net/PortKnocking.html#Limit</a> . In other words: out with the old, in with the new. On the same page, further up, there is a replacement for the Whitelist-action as well.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Jonathan		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-18294</link>

		<dc:creator><![CDATA[Jonathan]]></dc:creator>
		<pubDate>Wed, 18 Oct 2006 10:45:29 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-18294</guid>

					<description><![CDATA[... belay that comment.
I&#039;m slightly dumb today and wasn&#039;t reading your instructions correctly.
It all seems to be working now that I correctly followed them.
Thanks for writing the scripts :)]]></description>
			<content:encoded><![CDATA[<p>&#8230; belay that comment.<br />
I&#8217;m slightly dumb today and wasn&#8217;t reading your instructions correctly.<br />
It all seems to be working now that I correctly followed them.<br />
Thanks for writing the scripts :)</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Jonathan		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-18291</link>

		<dc:creator><![CDATA[Jonathan]]></dc:creator>
		<pubDate>Wed, 18 Oct 2006 10:25:33 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-18291</guid>

					<description><![CDATA[Hi!

I&#039;m quite new to shorewall, but I&#039;ve been experiencing bruteforce ssh attacks and so I wanted to use your scripts to try and stop them. Unfortunately, when I try to start shorewall again, the command fails with:

ERROR: Invalid TARGET in rule &quot;[ -n &quot;$TAG&quot; ] &#124;&#124; fatal_error &quot;TAG not set&quot; &quot;

And so I&#039;m not sure what&#039;s going wrong ...]]></description>
			<content:encoded><![CDATA[<p>Hi!</p>
<p>I&#8217;m quite new to shorewall, but I&#8217;ve been experiencing bruteforce ssh attacks and so I wanted to use your scripts to try and stop them. Unfortunately, when I try to start shorewall again, the command fails with:</p>
<p>ERROR: Invalid TARGET in rule &#8220;[ -n &#8220;$TAG&#8221; ] || fatal_error &#8220;TAG not set&#8221; &#8221;</p>
<p>And so I&#8217;m not sure what&#8217;s going wrong &#8230;</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Juergen Kreileder		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-107</link>

		<dc:creator><![CDATA[Juergen Kreileder]]></dc:creator>
		<pubDate>Tue, 11 Oct 2005 10:37:46 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-107</guid>

					<description><![CDATA[Yes, they time out within a minute when the attacker stops sending packets.

The &lt;a href=&quot;/static/shorewall/Limit&quot;&gt;&lt;code&gt;Limit&lt;/code&gt;&lt;/a&gt; action uses &quot;... -m recent --update --seconds 60 --hitcount 6 -rttl --name SSH -j DROP&quot;.  That means: If the source address is in the ipt_recent list named &lt;em&gt;SSH&lt;/em&gt; and six or more NEW packets with the same TTL have been received in the last 60 seconds then drop this packet.  Once the number of packets received in the last 60 seconds drops below 6 again (ie. if no new packets arrive for some time), the rule won&#039;t hit.]]></description>
			<content:encoded><![CDATA[<p>Yes, they time out within a minute when the attacker stops sending packets.</p>
<p>The <a href="/static/shorewall/Limit"><code>Limit</code></a> action uses &#8220;&#8230; -m recent &#8211;update &#8211;seconds 60 &#8211;hitcount 6 -rttl &#8211;name SSH -j DROP&#8221;.  That means: If the source address is in the ipt_recent list named <em>SSH</em> and six or more NEW packets with the same TTL have been received in the last 60 seconds then drop this packet.  Once the number of packets received in the last 60 seconds drops below 6 again (ie. if no new packets arrive for some time), the rule won&#8217;t hit.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: micah		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-106</link>

		<dc:creator><![CDATA[micah]]></dc:creator>
		<pubDate>Tue, 11 Oct 2005 00:47:56 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-106</guid>

					<description><![CDATA[Do these DROP&#039;s ever time out? It would be good if they were automatically released a few hours later...]]></description>
			<content:encoded><![CDATA[<p>Do these DROP&#8217;s ever time out? It would be good if they were automatically released a few hours later&#8230;</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Juergen Kreileder		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-100</link>

		<dc:creator><![CDATA[Juergen Kreileder]]></dc:creator>
		<pubDate>Fri, 07 Oct 2005 18:01:41 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-100</guid>

					<description><![CDATA[I&#039;ll post an extended article in the next days.]]></description>
			<content:encoded><![CDATA[<p>I&#8217;ll post an extended article in the next days.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Hal Dougherty		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-99</link>

		<dc:creator><![CDATA[Hal Dougherty]]></dc:creator>
		<pubDate>Fri, 07 Oct 2005 17:32:57 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-99</guid>

					<description><![CDATA[I second the request. I&#039;ve had someone trying to log in as root and other users for some time now. I use secure passwords, disalow root login and use shorewall to drop or reject multiple login trys, but a working script to limit failed attempts would be fantastic. 

Thanks in advance.]]></description>
			<content:encoded><![CDATA[<p>I second the request. I&#8217;ve had someone trying to log in as root and other users for some time now. I use secure passwords, disalow root login and use shorewall to drop or reject multiple login trys, but a working script to limit failed attempts would be fantastic. </p>
<p>Thanks in advance.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: joeyski		</title>
		<link>/articles/mitigating-ssh-brute-force-attacks-with-ipt_recent/comment-page-1/#comment-98</link>

		<dc:creator><![CDATA[joeyski]]></dc:creator>
		<pubDate>Thu, 06 Oct 2005 11:15:41 +0000</pubDate>
		<guid isPermaLink="false">http://blog.blackdown.de/?p=3#comment-98</guid>

					<description><![CDATA[I got here from this link:

http://thread.gmane.org/gmane.linux.gentoo.security/2486

can you make a more noobie friendly with more explanation, step by step guide for this?

Thanks for this guide.]]></description>
			<content:encoded><![CDATA[<p>I got here from this link:</p>
<p><a href="http://thread.gmane.org/gmane.linux.gentoo.security/2486" rel="nofollow ugc">http://thread.gmane.org/gmane.linux.gentoo.security/2486</a></p>
<p>can you make a more noobie friendly with more explanation, step by step guide for this?</p>
<p>Thanks for this guide.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
