idea against hacks - help to IDS of a new generation
Kaleta Stanley
openssh-unix-dev at kaleta.sk
Fri Sep 30 06:22:03 EST 2005
Hi,
i just subscribed and created new email account only for this purpose,
to send you an idea (or 2).
;)
the problem:
i have full logs of intrussions from some automats trying dictionary
passwords for other dictionary logins.
the status:
these are some "actions" during client-server handshaking:
1. client connects
2. client waits for server feedback
3. server responds
4. client sends a login (or keys handshake ...)
5. server accepts the connection and sends back the confirmation
6. communication
question I.:
what about to add some "delay" as '-' option[s] to sshd
that will wait/sleep some nans/tens of seconds between some of these
handshakes
?
i think it would not be problem to update all the client SW's
to accept this option...
but in between,
some CPU could be used for IDS SW's to indetify the intrussion.
to put some iptables -I ... for instance...
(i have some own simple IDS and i'm really missing such "delay" and CPU
to make an action...)
i use login password identification mostly,
and i have no problem to wait (if keys) 2-5 seconds for
authentification...
... but intrussion SW's don't wait - they just try ...
question II.:
another possibility ;)
what about to add "optional action" as parameter of sshd
(could be used for IDS' )
in case of intrussion detection (anyway logged to syslog)
to run some rule based "anything"
?
br
Stanley
More information about the openssh-unix-dev
mailing list