<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Timeouts in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580695#M49821</link>
    <description>I've found a solution that's close to what I was hoping for (and perhaps as close as I'm going to get).&lt;BR /&gt;&lt;BR /&gt;LoginGraceTime is the operating parameter. It's 600 seconds by default. I changed it to 30 seconds. This is in TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]SSHD2_CONFIG. FWIW, 30 seconds happens to be the same as my LGI_PWD_TMO setting.&lt;BR /&gt;&lt;BR /&gt;As "luck" would have it, an obliging attacker launched a barrage of SSH connection attempts after I changed LoginGraceTime -- 84 attempts in just under 6 minutes, roughly one attempt every 4.2 seconds.&lt;BR /&gt;&lt;BR /&gt;If LoginGraceTime had been 600, I'd have had 84 concurrent SSH sessions from that one source address. If my connection limit was less than 84 + &amp;lt;# of welcome connections&amp;gt;, there'd have been a denial of service, from just one attacker.&lt;BR /&gt;&lt;BR /&gt;With LoginGraceTime at 30 seconds, I never had more than 8 connections at a time (from that source). There were 7-8 concurrent processes for a period of slightly less than 5 minutes.&lt;BR /&gt;&lt;BR /&gt;Even if the connections had arrived twice as fast, there wouldn't have been more than 16 at a time, for a duration of less than 3 minutes.&lt;BR /&gt;&lt;BR /&gt;I've raised the connection limit, a risk I can bear now that I've shortened LoginGraceLimit. With LoginGraceLimit at 30 seconds, several attackers would have to hit me within the same few minutes for a denial of service. Previously, one attacker could deny service without outside help ;-).&lt;BR /&gt;</description>
    <pubDate>Wed, 13 Jul 2005 13:15:43 GMT</pubDate>
    <dc:creator>James Becker</dc:creator>
    <dc:date>2005-07-13T13:15:43Z</dc:date>
    <item>
      <title>SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580688#M49814</link>
      <description>Once or twice on most days, we receive a barrage of SSH connection attempts from unpredictable external sources. The barrage reaches the SSH service limit, in effect disabling SSH until the created processes terminate.&lt;BR /&gt;&lt;BR /&gt;When the SSH barrage comes from a given source, it repeats this pattern:&lt;BR /&gt;1) A process starts under the TCPIP$SSH username (start time as reported in the process termination record).&lt;BR /&gt;2) 2-3 seconds later, a login failure or a breakin detection is logged for that PID.&lt;BR /&gt;3) Less than a second later, the same source returns to step 1, creating another process. However...&lt;BR /&gt;4) The process created in step 1 terminates 10 minutes later with %SYSTEM-S-NORMAL. That is, it spends over 99% of its life serving no useful purpose, and tying up a connection,&lt;BR /&gt;&lt;BR /&gt;This repeats until we run into the service limit for SSH, which we have at 10, or until the attacker gives up.&lt;BR /&gt;&lt;BR /&gt;In effect, an attacker can use up our available SSH connections in less than 30 seconds, and the denial of service lasts for about 10 minutes.&lt;BR /&gt;&lt;BR /&gt;Can we shorten the 10-minute timeout? That would at least reduce the duration of the denial of service.&lt;BR /&gt;&lt;BR /&gt;When we had a higher service limit, that too would get used up in SSH barrages.&lt;BR /&gt;&lt;BR /&gt;We want to use SSH more broadly (as a replacement for unencrypted telnet &amp;amp; ftp), but the more we depend on it, the more we're vulnerable to this denial of service.&lt;BR /&gt;&lt;BR /&gt;Any suggestions?&lt;BR /&gt;&lt;BR /&gt;$ tcpip show version&lt;BR /&gt;&lt;BR /&gt;  HP TCP/IP Services for OpenVMS Alpha Version V5.4 - ECO 4&lt;BR /&gt;  on a AlphaServer ES45 Model 2 running OpenVMS V7.3-2&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Jul 2005 10:11:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580688#M49814</guid>
      <dc:creator>James Becker</dc:creator>
      <dc:date>2005-07-12T10:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580689#M49815</link>
      <description>Are your allowed connections coming from known IP addresses?  If so see the help for TCPIP SET SERVICE /ACCEPT.  We only allow connections from known networks that can reach DCL.  For example:&lt;BR /&gt;&lt;BR /&gt;TCPIP SET SERVICE SSH /ALLOW = (208.46.36.0:255.255.255.0) &lt;BR /&gt;&lt;BR /&gt;Once you use /allow anything that isn't allowed is automatically rejected.  You'll need to disable/enable SSH for the change to work.  &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Jul 2005 10:56:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580689#M49815</guid>
      <dc:creator>Andy Bustamante</dc:creator>
      <dc:date>2005-07-12T10:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580690#M49816</link>
      <description>Yup, if we knew in advance where the allowed connections were coming from, we'd be home free. No such luck.&lt;BR /&gt;&lt;BR /&gt;We also don't know in advance where the unwelcome connections would come from. Besides, there are too many sources (160 so far in 2005) for set service /reject ("Maximum is 16").&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Jul 2005 11:20:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580690#M49816</guid>
      <dc:creator>James Becker</dc:creator>
      <dc:date>2005-07-12T11:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580691#M49817</link>
      <description>Welcome to life on the Internet.  My border machine gets SSH attempts hundreds of times a day.&lt;BR /&gt;&lt;BR /&gt;You could get a machine whose only purpose in life is to accept the SSH connections.  That would allow you to run the connection limit waaay up without messing up your production machine.&lt;BR /&gt;&lt;BR /&gt;Since you want to use SSH to replace FTP, that's perfect -- the client they use can use the encrypted tunnel via port forwarding to hit the production system.&lt;BR /&gt;&lt;BR /&gt;The border machine could be something small like a DS-10L.  Last I knew, Island Computer was selling them for ~$1k.</description>
      <pubDate>Wed, 13 Jul 2005 07:02:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580691#M49817</guid>
      <dc:creator>Stanley F Quayle</dc:creator>
      <dc:date>2005-07-13T07:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580692#M49818</link>
      <description>james,&lt;BR /&gt;&lt;BR /&gt;I'd use /ALLOW if the number of acceptable sources is limited (which is normally the case) since the vast majority of requests will come from unacceptable sources (way above the limit). Not allowed = rejected.&lt;BR /&gt;&lt;BR /&gt;I agree it won't help a lot if valid requests come from a dynamic source (dial-up ISP connection, DSL via most ISP's, different locations...) but it limits the problem.&lt;BR /&gt;A border machine, or firewall perhaps, could indeed be the solution. Even a PWS600au or XP1000 would do - sold at Island for (far) less than a DS10L. You can get more RAM in the machine boosting the number of cooncurrent SSH sessions, I bet. It's a slower CPU but I guess most users won't even mark the difference.&lt;BR /&gt;&lt;BR /&gt;Willem</description>
      <pubDate>Wed, 13 Jul 2005 07:40:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580692#M49818</guid>
      <dc:creator>Willem Grooters</dc:creator>
      <dc:date>2005-07-13T07:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580693#M49819</link>
      <description>Those are good points, but what I was actually hoping for was a way to get those processes not to last for 10 minutes. I gather that this isn't configurable.&lt;BR /&gt;&lt;BR /&gt;If the processes terminated upon login failure, my problem would be largely solved. That is, DoS would be achieved only if n attackers all made the attempt at about the same time. But because the processes last for 10 minutes, DoS is achieved if only 1 attacker makes n attempts within a 10-minute period. (n as in set service/limit=n)&lt;BR /&gt;&lt;BR /&gt;If I get another VMS box to serve as an intermediary, I have the same problem, just on a different box.</description>
      <pubDate>Wed, 13 Jul 2005 09:08:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580693#M49819</guid>
      <dc:creator>James Becker</dc:creator>
      <dc:date>2005-07-13T09:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580694#M49820</link>
      <description>&amp;gt; If I get another VMS box to serve as an intermediary, I have the same problem, just on a different box.&lt;BR /&gt;&lt;BR /&gt;Right.  But you can get a box for people on the 'Net to beat up that's very cheap, with enough resources that you can have thousands of these hanging connections without a problem.&lt;BR /&gt;&lt;BR /&gt;You could even run something like Watcher or Hitman on it and zap connections that aren't pulling I/O.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 13 Jul 2005 09:26:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580694#M49820</guid>
      <dc:creator>Stanley F Quayle</dc:creator>
      <dc:date>2005-07-13T09:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580695#M49821</link>
      <description>I've found a solution that's close to what I was hoping for (and perhaps as close as I'm going to get).&lt;BR /&gt;&lt;BR /&gt;LoginGraceTime is the operating parameter. It's 600 seconds by default. I changed it to 30 seconds. This is in TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]SSHD2_CONFIG. FWIW, 30 seconds happens to be the same as my LGI_PWD_TMO setting.&lt;BR /&gt;&lt;BR /&gt;As "luck" would have it, an obliging attacker launched a barrage of SSH connection attempts after I changed LoginGraceTime -- 84 attempts in just under 6 minutes, roughly one attempt every 4.2 seconds.&lt;BR /&gt;&lt;BR /&gt;If LoginGraceTime had been 600, I'd have had 84 concurrent SSH sessions from that one source address. If my connection limit was less than 84 + &amp;lt;# of welcome connections&amp;gt;, there'd have been a denial of service, from just one attacker.&lt;BR /&gt;&lt;BR /&gt;With LoginGraceTime at 30 seconds, I never had more than 8 connections at a time (from that source). There were 7-8 concurrent processes for a period of slightly less than 5 minutes.&lt;BR /&gt;&lt;BR /&gt;Even if the connections had arrived twice as fast, there wouldn't have been more than 16 at a time, for a duration of less than 3 minutes.&lt;BR /&gt;&lt;BR /&gt;I've raised the connection limit, a risk I can bear now that I've shortened LoginGraceLimit. With LoginGraceLimit at 30 seconds, several attackers would have to hit me within the same few minutes for a denial of service. Previously, one attacker could deny service without outside help ;-).&lt;BR /&gt;</description>
      <pubDate>Wed, 13 Jul 2005 13:15:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580695#M49821</guid>
      <dc:creator>James Becker</dc:creator>
      <dc:date>2005-07-13T13:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580696#M49822</link>
      <description>Hi James, very interesting !&lt;BR /&gt;&lt;BR /&gt;Remark: Eco 5 is available since June 2005, it contains SSH service V3.2 instead of V2.? of Eco 4. A real big hop.&lt;BR /&gt;&lt;BR /&gt;For us it means the first time to be able to use SSH on VMS along with our internal security related demands (identifying remote host etc. at login time without using own written scripts).&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;EW</description>
      <pubDate>Thu, 14 Jul 2005 12:26:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580696#M49822</guid>
      <dc:creator>Eberhard Wacker</dc:creator>
      <dc:date>2005-07-14T12:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580697#M49823</link>
      <description>Just checking in with a follow-up.&lt;BR /&gt;&lt;BR /&gt;The LoginGraceLimit solution (30 seconds vs. 600) is working well enough.&lt;BR /&gt;&lt;BR /&gt;So far, all attackers, without exception, appear to be waiting for the login failure before they attempt another connection. As a result, the connection attempts come every 2-4 seconds. In 30 seconds, therefore, you'd expect up to 15 or so connections.&lt;BR /&gt;&lt;BR /&gt;TCPIP SHOW SERVICE SSH/FULL bears that out. The peak it reports has been 15 + &amp;lt;# of expected sessions&amp;gt;, even when they make hundreds or thousands of attempts.&lt;BR /&gt;&lt;BR /&gt;I'm not entirely safe, of course. If enough attackers all try at the same time, or if they start making rapid-fire attempts without waiting for the login failure, I'll be in trouble again. So far, that hasn't been the pattern.&lt;BR /&gt;</description>
      <pubDate>Mon, 25 Jul 2005 09:58:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580697#M49823</guid>
      <dc:creator>James Becker</dc:creator>
      <dc:date>2005-07-25T09:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Timeouts</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580698#M49824</link>
      <description>How about assigning some points to the responses?&lt;BR /&gt;&lt;BR /&gt;Pointer to help on points:&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/helptips.do?#33" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/helptips.do?#33&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Aug 2005 07:18:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-timeouts/m-p/3580698#M49824</guid>
      <dc:creator>Stanley F Quayle</dc:creator>
      <dc:date>2005-08-30T07:18:05Z</dc:date>
    </item>
  </channel>
</rss>

