[3814] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Possible Denial of Service: SSH

daemon@ATHENA.MIT.EDU (Jim Dennis)
Wed Dec 18 18:13:44 1996

Date: 	Wed, 18 Dec 1996 13:41:00 -0800
Reply-To: Jim Dennis <jimd@starshine.org>
From: Jim Dennis <jimd@starshine.org>
X-To:         tsoome@ut.ee
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
In-Reply-To:  <Pine.GSO.3.95.961218112419.10566A-100000@madli.ut.ee> from
              "Toomas Soome" at Dec 18, 96 11:30:42 am

> On Tue, 17 Dec 1996, Sean B. Hamor wrote:
>
>> I believe I may have found a possible denial of service attack for use
>> against SSH.  The attack requires an account on the target machine.  I found
>> this using the following setup:
>>

...

>>
> there is mutch simpler way to block sshd - just force sshd to ask password
> in login time, now create connection and let ssh to wait for password....
> no one can login with ssh (with or without password) during this wait
> time.... tested with 1.2.17
>
> toomas soome

        Try configuring it to run via inetd with a nowait flag in
        the /etc/inetd.conf.

        This will make the initial connection (the latency) much
        longer but should prevent that problem.


        Naturally this decision hinges upon your use.  For a
        multi-user shell machine, use inetd.conf.  For your personal
        workstation or one of your servers; where you only need
        or a few people to access it -- and you have packet filters
        to prevent DOSA from outside; use a statically loaded sshd.

        You can also configure sshd to refuse connections from
        unknown hosts.  You could also keep one statically loaded
        sshd on one port -- and keep an inetd launched one on another
        port (so you only access the inetd one manually when it appears
        that you are being victimized).


        Jim Dennis,
        Starshine Technical Services

home help back first fref pref prev next nref lref last post