Gentoo Archives: gentoo-user

From: Adam Carter <Adam.Carter@×××××××××.au>
To: "gentoo-user@l.g.o" <gentoo-user@l.g.o>
Subject: RE: [gentoo-user] Curious pattern in log files from ssh...
Date: Thu, 04 Dec 2008 22:38:47
Message-Id: 5602B0BD6D59AE4791BE83104940118D3C05D80D@excprdmbxw002.optus.com.au
In Reply to: Re: [gentoo-user] Curious pattern in log files from ssh... by Evgeniy Bushkov
1 > Also take a note that there are no "known-compromised hosts"
2
3 What about hosts listed in RBLs? http://en.wikipedia.org/wiki/Comparison_of_DNS_blacklists. It would be interesting to see if how much correlation there is between ssh brute forcing bots and the contents of the various lists.
4
5 > because ANY IP can be forged.
6
7 Its easy enough to forge a SYN, but to setup a session so you can make a password guessing attempt requires that you also get the packets back from the server, which is an order of magnitude more difficult. Ever since OSes have implemented well chosen initial sequence numbers, spoofing of TCP sessions has become very difficult.

Replies

Subject Author
RE: [gentoo-user] Curious pattern in log files from ssh... Adam Carter <Adam.Carter@×××××××××.au>
Re: [gentoo-user] Curious pattern in log files from ssh... Evgeniy Bushkov <zhen@×××××××××.ru>