HOWTO Secure SSHd with BlockHosts
(Updated version: http://gentoo-wiki.com/HOWTO_BlockHosts)
Protecting SSHd (and others) with BlockHosts
What is BlockHosts?
Blockhosts is a python script which records how many times a system service has been probed, using configurable pattern matching to recognize failed accesses (such as for "sshd" or "proftpd" or any service), and when a particular IP address exceeds a certain number of failed attempts that IP address is blocked by using one of the following techniques, e.g.:
- using TCP_WRAPPERS (writes to /etc/hosts.allow)
- using "ip route" commands to setup null-routing for attackers
- using IPtables to setup packet filtering for attackers
I decided to install BlockHosts rather than its aquivalents, e.g. denyhosts or fail2ban, because it provided more features:
- BlockHosts can prevent attacks from SSHd and many other services (such as proftpd, vsftpd) innately, rather than its equivalents
- It provides multiple ways to block the attacker
- It's very easy to set up
Currently there's no BlockHosts package in the Portage tree. I've written an ebuild (thanks again to #gentoo-sunrise for reviewing it) which should work (for all archs?). If you do not know how to cope with 3rd party ebuilds, refer to the handbook.
Download: blockhosts ebuild
WARNING: I assume that you've set your PORTDIR_OVERLAY to /usr/local/portage. First, copy the ebuild to /usr/local/portage/app-admin/blockhosts/. Then do this:
# Create blockhosts digest ebuild /usr/local/portage/app-admin/blockhosts/blockhosts-2.0.2.ebuild digest # Unmask blockhosts echo "app-admin/blockhosts ~x86" >> /etc/portage/package.keywords # I'm not sure if this is needed, but it won't hurt anyone emerge --metadata # Emerge it emerge -va app-admin/blockhosts
First, you need to create and edit some files
# Create /etc/hosts.allow if it does not exists (required by BlockHosts) touch /etc/hosts.allow # Append the following lines to /etc/hosts.allow # (BlockHosts will write its own stuff between them) echo "#---- BlockHosts Additions" >> /etc/hosts.allow echo "#---- BlockHosts Additions" >> /etc/hosts.allow
Setting up BlockHosts protecting SSHd
Setting up openssh:
Check if openssh was merged with the tcpd useflag enabled:
equery uses openssh
If not, add this useflag (it's necessary to work with TCP_WRAPPERS) to the openssh package
echo "net-misc/openssh tcpd" >> /etc/portage/package.use
Re-emerge to apply use flags
emerge -va net-misc/openssh
Check if your SSHd logs to /var/log/sshd (Gentoo default, afaik)
If there's some recent output, everything's ok. Proceed.
Setting up BlockHosts:
All occurences of LOGFILES are commented, uncomment the first occurence, and change "secure" to "sshd".
... LOGFILES = [ "/var/log/sshd", ] #LOGFILES = [ "/var/log/auth.log", ] #LOGFILES = [ "/var/log/secure", "/var/log/vsftpd.log", ] ...
Save, close nano again, this should be enough.
You can tune some settings in the config file if you like to (THRESHOLD and stuff), but the defaults are ok.
Run blockhosts.py in --dry-run mode (simulation):
# This will check your logs for potential attacks
The blockhosts.py script should output something like this (assumed there were some failed login attempts already):
/usr/bin/blockhosts.py --dry-run --verbose
... #---- BlockHosts Additions ALL: 184.108.40.206 : deny #bh: ip: 220.127.116.11 : 8 : 2007-04-10 00:52:23 CEST #bh: logfile: /var/log/sshd #bh: offset: 13083 #bh: first line:Apr 9 23:49:37 hostname sshd(pam_unix): authentication$ #---- BlockHosts Additions ...
- The lines starting with "#bh: ip:" count how many times a host has failed to login to any of your services.
- The lines starting with "ALL:" are the blocked hosts.
Now, if everything seems to be ok, drop the --dry-run parameter.
BlockHosts will now write to the /etc/hosts.allow file and every service that uses TCPWRAPPERS (modwrap for proftpd) refuses connections from this ip.
Now we want to have a cronjob or something which will run blockhosts.py again and again, to check the logs frequently.
Add a cronjob which runs every five minutes
Add blockhosts.py cron
*/5 * * * * /usr/bin/blockhosts.py --verbose >> /var/log/blockhosts.log 2>&1
Save, close. BlockHosts should now update hosts.allow every five minutes.
- BlockHosts and iptables
- BlockHosts + spawn utility
http://www.aczoom.com/tools/blockhosts/ - BlockHosts Homepage