Hacker News new | past | comments | ask | show | jobs | submit login

What's the best way to make sure that your system isn't part of this?



As others mentioned, prevent password logins. I also recommend fail2ban[0] for completely blocking IPs after detecting repeat failed access attempts.

[0] http://www.fail2ban.org/


Fail2Ban is great - I've used it for more than just blocking brute force attacks on ssh (although a real security expert might say this is the wrong tool to use).


Yep, I also use it to detect repeat errors on our own application logs and block offending IPs.

Fail2ban has a reasonably easy to tweak detection and blocking rules, plus lots of available ready-made ones that do the job. If you're comfortable with regular expressions (which most people on HN probably are), then it's really straight-forward to write your own rules.

The only problem I encountered with it is when you start it up and you have a huge amount of data in your log files. It can cause 100% cpu usage for a long time until it digests the whole thing...



`PermitRootLogin = without-password` in /etc/ssh/sshd_config

Same thing for non-root: `AuthenticationMethods = publickey`

And when buying a router, buy something that will get regular security updates, or where you can put OpenWRT.


From openssh 7.0 release notes:

  * PermitRootLogin=without-password/prohibit-password now bans all
    interactive authentication methods, allowing only public-key,
    hostbased and GSSAPI authentication (previously it permitted
    keyboard-interactive and password-less authentication if those
    were enabled).
It mentions that previously without-password it would still allow keyboard-interactive logins. Should be fairly easy to fake for a botnet!


I still prefer "PermitRootLogin=no".


However unrealistic it is, I still wish that open source Projects would agree on what to call things.

The /etc/sudoers NOPASSWD and sshd without-password sound like the same thing, but are far from that.

I feel like they could have named it better.


Sudoers NOPASSWD means you don't have to type the password for that feature. Sshd without-password means passwords are disabled. Not the same thing.


I garbled my post :(

Pull the plug /s

Don't allow password-based SSH access.

https://blogs.akamai.com/2015/09/xor-ddos-threat-advisory.ht...

https://isc.sans.edu/forums/diary/XOR+DDOS+Mitigation+and+An... example (first Google result)


[deleted]


Makes one ponder the issue of monoculture...


Sorry, I tripped up.


If for some bizarre reason you allow remote root logins over ssh be sure that that password is as strong as possible. Machine generated random strings are good, at least 12 characters to be sure.

If you turn off root logins but still allow user logins the remote attacking system will have no way to detect that fact and will still attempt to brute force you.


I think monitoring your outgoing traffic would give you a clue. Also if what I read on Ars is correct, this botnet preys on weak root passwords, so disabling remote root or using keys would be great ways to protect yourself against this botnet.


This! And also, in sshd_config, disable password-based authentication. But first, make sure that key-based authentication works ;)



Use a good password.




Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: