[3812] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Possible Denial of Service: SSH

daemon@ATHENA.MIT.EDU (Toomas Soome)
Wed Dec 18 12:38:26 1996

Date: 	Wed, 18 Dec 1996 11:30:42 +0200
Reply-To: Toomas Soome <tsoome@ut.ee>
From: Toomas Soome <tsoome@ut.ee>
X-To:         "Sean B. Hamor" <hamors@litterbox.org>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
In-Reply-To:  <Pine.LNX.3.95.961217220208.255A-100000@litterbox.org>

On Tue, 17 Dec 1996, Sean B. Hamor wrote:

> I believe I may have found a possible denial of service attack for use
> against SSH.  The attack requires an account on the target machine.  I found
> this using the following setup:
>
lots deleted
>
> It seems that when my Windows 95 laptop establishes a connection to my Linux
> box via SSH and the PPP connection drops, all processes that were being
> controlled by the inbound SSH connection get zombied out.  If I establish a
> connection and exit/drop the SSH connection, the Linux box recovers fine.
> This problem only occurs when the PPP connection drops.
>

there is mutch simpler way to block sshd - just force sshd to ask password
in login time, now create connection and let ssh to wait for password....
no one can login with ssh (with or without password) during this wait
time.... tested with 1.2.17

toomas soome
--
 Redistribution by Microsoft Network is prohibited.
 PGP public key: http://www.cs.ut.ee/~tsoome/pgp.txt

home help back first fref pref prev next nref lref last post