- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Re: SSH Timeouts
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-12-2005 03:11 AM
07-12-2005 03:11 AM
SSH Timeouts
When the SSH barrage comes from a given source, it repeats this pattern:
1) A process starts under the TCPIP$SSH username (start time as reported in the process termination record).
2) 2-3 seconds later, a login failure or a breakin detection is logged for that PID.
3) Less than a second later, the same source returns to step 1, creating another process. However...
4) The process created in step 1 terminates 10 minutes later with %SYSTEM-S-NORMAL. That is, it spends over 99% of its life serving no useful purpose, and tying up a connection,
This repeats until we run into the service limit for SSH, which we have at 10, or until the attacker gives up.
In effect, an attacker can use up our available SSH connections in less than 30 seconds, and the denial of service lasts for about 10 minutes.
Can we shorten the 10-minute timeout? That would at least reduce the duration of the denial of service.
When we had a higher service limit, that too would get used up in SSH barrages.
We want to use SSH more broadly (as a replacement for unencrypted telnet & ftp), but the more we depend on it, the more we're vulnerable to this denial of service.
Any suggestions?
$ tcpip show version
HP TCP/IP Services for OpenVMS Alpha Version V5.4 - ECO 4
on a AlphaServer ES45 Model 2 running OpenVMS V7.3-2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-12-2005 03:56 AM
07-12-2005 03:56 AM
Re: SSH Timeouts
TCPIP SET SERVICE SSH /ALLOW = (208.46.36.0:255.255.255.0)
Once you use /allow anything that isn't allowed is automatically rejected. You'll need to disable/enable SSH for the change to work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-12-2005 04:20 AM
07-12-2005 04:20 AM
Re: SSH Timeouts
We also don't know in advance where the unwelcome connections would come from. Besides, there are too many sources (160 so far in 2005) for set service /reject ("Maximum is 16").
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-13-2005 12:02 AM
07-13-2005 12:02 AM
Re: SSH Timeouts
You could get a machine whose only purpose in life is to accept the SSH connections. That would allow you to run the connection limit waaay up without messing up your production machine.
Since you want to use SSH to replace FTP, that's perfect -- the client they use can use the encrypted tunnel via port forwarding to hit the production system.
The border machine could be something small like a DS-10L. Last I knew, Island Computer was selling them for ~$1k.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-13-2005 12:40 AM
07-13-2005 12:40 AM
Re: SSH Timeouts
I'd use /ALLOW if the number of acceptable sources is limited (which is normally the case) since the vast majority of requests will come from unacceptable sources (way above the limit). Not allowed = rejected.
I agree it won't help a lot if valid requests come from a dynamic source (dial-up ISP connection, DSL via most ISP's, different locations...) but it limits the problem.
A border machine, or firewall perhaps, could indeed be the solution. Even a PWS600au or XP1000 would do - sold at Island for (far) less than a DS10L. You can get more RAM in the machine boosting the number of cooncurrent SSH sessions, I bet. It's a slower CPU but I guess most users won't even mark the difference.
Willem
OpenVMS Developer & System Manager
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-13-2005 02:08 AM
07-13-2005 02:08 AM
Re: SSH Timeouts
If the processes terminated upon login failure, my problem would be largely solved. That is, DoS would be achieved only if n attackers all made the attempt at about the same time. But because the processes last for 10 minutes, DoS is achieved if only 1 attacker makes n attempts within a 10-minute period. (n as in set service/limit=n)
If I get another VMS box to serve as an intermediary, I have the same problem, just on a different box.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-13-2005 02:26 AM
07-13-2005 02:26 AM
Re: SSH Timeouts
Right. But you can get a box for people on the 'Net to beat up that's very cheap, with enough resources that you can have thousands of these hanging connections without a problem.
You could even run something like Watcher or Hitman on it and zap connections that aren't pulling I/O.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-13-2005 06:15 AM
07-13-2005 06:15 AM
Re: SSH Timeouts
LoginGraceTime is the operating parameter. It's 600 seconds by default. I changed it to 30 seconds. This is in TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]SSHD2_CONFIG. FWIW, 30 seconds happens to be the same as my LGI_PWD_TMO setting.
As "luck" would have it, an obliging attacker launched a barrage of SSH connection attempts after I changed LoginGraceTime -- 84 attempts in just under 6 minutes, roughly one attempt every 4.2 seconds.
If LoginGraceTime had been 600, I'd have had 84 concurrent SSH sessions from that one source address. If my connection limit was less than 84 + <# of welcome connections>, there'd have been a denial of service, from just one attacker.
With LoginGraceTime at 30 seconds, I never had more than 8 connections at a time (from that source). There were 7-8 concurrent processes for a period of slightly less than 5 minutes.
Even if the connections had arrived twice as fast, there wouldn't have been more than 16 at a time, for a duration of less than 3 minutes.
I've raised the connection limit, a risk I can bear now that I've shortened LoginGraceLimit. With LoginGraceLimit at 30 seconds, several attackers would have to hit me within the same few minutes for a denial of service. Previously, one attacker could deny service without outside help ;-).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-14-2005 05:26 AM
07-14-2005 05:26 AM
Re: SSH Timeouts
Remark: Eco 5 is available since June 2005, it contains SSH service V3.2 instead of V2.? of Eco 4. A real big hop.
For us it means the first time to be able to use SSH on VMS along with our internal security related demands (identifying remote host etc. at login time without using own written scripts).
Cheers
EW
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-25-2005 02:58 AM
07-25-2005 02:58 AM
Re: SSH Timeouts
The LoginGraceLimit solution (30 seconds vs. 600) is working well enough.
So far, all attackers, without exception, appear to be waiting for the login failure before they attempt another connection. As a result, the connection attempts come every 2-4 seconds. In 30 seconds, therefore, you'd expect up to 15 or so connections.
TCPIP SHOW SERVICE SSH/FULL bears that out. The peak it reports has been 15 + <# of expected sessions>, even when they make hundreds or thousands of attempts.
I'm not entirely safe, of course. If enough attackers all try at the same time, or if they start making rapid-fire attempts without waiting for the login failure, I'll be in trouble again. So far, that hasn't been the pattern.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-30-2005 12:18 AM
08-30-2005 12:18 AM
Re: SSH Timeouts
Pointer to help on points:
http://forums1.itrc.hp.com/service/forums/helptips.do?#33
Thanks in advance.