[nycbug-talk] Distributed ssh dictionary attacks
Miles Nordin
carton at Ivy.NET
Wed Nov 26 14:09:50 EST 2008
>>>>> "ak" == Andy Kosela <akosela at andykosela.com> writes:
ak> I don't think it's very reasonable to open sshd(8) to the
ak> whole world
what do you use to get into your machines then, GoToMyPeeCee.com?
jesus, of course it's reasonable.
I think we're muddling this with squishy secure-feeling bikeshed
discussion. The point of PF and other blacklisting was to stop the
attackers from CPU-DoSing you with PFS key negotiations, not fear that
one of the stolen passwords in their database will actually work.
If you have the latter fear, I'd suggest:
(1) don't let users choose their own passwords. Make passwords with
pwgen, and give users the option to ``generate new password'',
but not to set it, and force generation of new ones a couple
times a year.
This does two things. First the passwords are good and hard to
replicate with dictionaries. Second and maybe more importantly,
it's less convenient for users to use your password on other
sites, so it's vastly less likely your passwords will end up in
the attacker's database. Users are so lazy, any crapass
VBulletin site is functionally a phishing site because they feed
the damn thing with the one password they use everywhere.
-or-
(2) use pubkey login only, no passwords.
-and-
(3) don't make the (1) stupid-user problem worse. If you ever store
a PAP-like password in a database, hash it. And OpenID-ify all
your web2.0 craplets so users can have their convenience without
being unhygenic.
The reason this new attack has come up is probably that the PF
blacklists _were_ effective at protecting bad passwords underneath.
If you'd kept the two attacks separate in your head before, then this
new variant of it wouldn't cause you any new worry.
well...provided you acted on what was in your head. I don't do (1) or
(2) or (3), so the new attack does cause me some extra worry.
but...yeah...it's starting to look like ``ability to receive plaintext
email at an address confirmed earlier, and the good fortune to have it
arrive unsnooped'' may actually be MORE secure than ``knowledge of a
password negotiated earlier over an encrypted link.''
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 304 bytes
Desc: not available
URL: <https://lists.nycbug.org:8443/pipermail/talk/attachments/20081126/81641b0c/attachment.bin>
More information about the talk
mailing list