[bitfolk] SSH access to Xen Shell will have to be tightened …

Top Page
Author: Andy Smith
Date:  
To: announce
Subject: [bitfolk] SSH access to Xen Shell will have to be tightened up

Reply to this message
gpg: Signature made Fri Mar 2 11:11:06 2018 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
Hi,

The level of SSH scanning is getting ridiculous.

Here's some stats on the number of Fail2Ban bans across all Xen
Shell hosts in the last 7 days:

# each ∎ represents a count of 46. total 4653
  59.63.166.104 [  2037] ∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎ (43.78%)
 58.218.198.142 [   998] ∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎ (21.45%)
  59.63.166.105 [   641] ∎∎∎∎∎∎∎∎∎∎∎∎∎ (13.78%)
 58.218.198.146 [   352] ∎∎∎∎∎∎∎ (7.57%)
 58.218.198.161 [   272] ∎∎∎∎∎ (5.85%)
   59.63.188.36 [   145] ∎∎∎ (3.12%)
  192.99.138.37 [    61] ∎ (1.31%)
   103.99.0.188 [    40]  (0.86%)
   218.65.30.40 [    15]  (0.32%)
 202.104.147.26 [    13]  (0.28%)
     42.7.26.15 [     8]  (0.17%)
163.172.229.252 [     8]  (0.17%)
     42.7.26.91 [     8]  (0.17%)
  198.98.57.188 [     8]  (0.17%)
   58.242.83.26 [     8]  (0.17%)
   58.242.83.27 [     8]  (0.17%)
  182.100.67.82 [     6]  (0.13%)
 217.99.228.158 [     5]  (0.11%)
   218.65.30.25 [     4]  (0.09%)
   117.50.14.83 [     4]  (0.09%)
   46.148.21.32 [     4]  (0.09%)
  178.62.213.66 [     3]  (0.06%)
 116.99.255.111 [     3]  (0.06%)
165.124.176.146 [     1]  (0.02%)
101.226.196.136 [     1]  (0.02%)


First three octets only:

# each ∎ represents a count of 61. total 4653
  59.63.166.0/24 [  2678] ∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎ (57.55%)
 58.218.198.0/24 [  1622] ∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎∎ (34.86%)
  59.63.188.0/24 [   145] ∎∎ (3.12%)
 192.99.138.0/24 [    61] ∎ (1.31%)
   103.99.0.0/24 [    40]  (0.86%)
  218.65.30.0/24 [    19]  (0.41%)
    42.7.26.0/24 [    16]  (0.34%)
  58.242.83.0/24 [    16]  (0.34%)
202.104.147.0/24 [    13]  (0.28%)
163.172.229.0/24 [     8]  (0.17%)
  198.98.57.0/24 [     8]  (0.17%)
 182.100.67.0/24 [     6]  (0.13%)
 217.99.228.0/24 [     5]  (0.11%)
  46.148.21.0/24 [     4]  (0.09%)
  117.50.14.0/24 [     4]  (0.09%)
 116.99.255.0/24 [     3]  (0.06%)
 178.62.213.0/24 [     3]  (0.06%)
165.124.176.0/24 [     1]  (0.02%)
101.226.196.0/24 [     1]  (0.02%)


That is with Fail2Ban adding a 10 minute ban after 10 login
failures. If there was no ban this would be 100s of thousands of
login attempts instead of 4,653 bans.

Yes I can send an abuse report to Chinanet's "Jiangxi telecom
network operation support department". Yes I can just firewall it
off. But that relies on periodic log file auditing.

There is already an SSH listening on port 922 that is not subject to
Fail2Ban. I would rather not have SSH on port 22 at all but in the
past I have been told this would not be acceptable because some
people are sometimes on networks where they can't connect to port
922. If that would be fine with you then no need to comment but it
might be interesting to hear from anyone who would still find this a
problem.

What are the feelings about setting port 22 Xen Shell access to
require SSH public key auth (while leaving 922 to allow password
authentication as well)?

Do those of you who've added SSH keys want an option to *require*
SSH keys even on port 922?

At the very least the Fail2Ban ban time is going to have to go up
from 10 minutes to let's say 6 hours.

Cheers,
Andy

--
https://bitfolk.com/ -- No-nonsense VPS hosting
_______________________________________________
announce mailing list
announce@???
https://lists.bitfolk.com/mailman/listinfo/announce