An Analysis of the DHEat DoS Against SSH in Cloud Environments
Joseph S. Testa II
jtesta at positronsecurity.com
Fri Apr 26 08:09:48 AEST 2024
A few days ago, I published an article analyzing the susceptibility of
the DHEat denial-of-service vulnerability against default OpenSSH
settings in cloud environments. I thought those on this list might be
interested:
https://www.positronsecurity.com/blog/2024-04-23-an-analysis-of-dheat-dos-against-ssh-in-cloud-environments/
A short summary: the default MaxStartup setting is fully ineffective in
fixing the problem in low-latency network conditions; it is very easy
to force a target to hit 100% CPU utilization in that case.
Furthermore, the PerSourceMaxStartups setting is only effective when
set to 1, which would only allow one unauthenticated connection at a
time from any given source. This works poorly in use cases where a
burst of new connects is normal. Hence, connection throttling at the
kernel level seems a bit better to use in the general case (for
example, allowing up to 10 connections every 10 seconds from a single
source; this would block the denial-of-service condition while also
allowing small, legitimate bursts of connections).
Also interesting is how little traffic (~15KB/s) can cause idle time
across multiple vCPUs to drop to zero. And how relatively easy it is
to flood a compute-optimized AWS instance with 32 vCPUs (!).
- Joe
--
Joseph S. Testa II
Founder & Principal Security Consultant
Positron Security
More information about the openssh-unix-dev
mailing list