I have more 500 in auth.log (ssh port change to 23):
I have more:
sshd[20620]: Bad protocol version identification 'guest' from 124.244.54.245 port 39405
sshd[16472]: Did not receive identification string from 87.76.240.167
How to block this in rules!!?
This are no failures in sense of authentication (because login does not take place).
But if you will that yet, just copy filter.d/sshd.conf
into filter.d/sshd.local
and add following to the failregex
:
^%(__prefix_line)sBad protocol version identification '.*' from <HOST> port \d+\s*$
^%(__prefix_line)sDid not receive identification string from <HOST>\s*$
Hi @sebres,
Could we think about adding the Bad protocol version
rule to the SSHd filter please ?
I'm also facing these messages...
Bad protocol version identification '.........' from A.B.C.D port 1234
Thank you very much 馃憤
I've submitted PR #2404 for this :)
Simple script to generate such a log:
watch -n 0.01 curl -m 1 127.0.0.1:22
Potential dos/ddos for sshd :warning: I thinks it's urgent
Fix (#2404) has been merged into 0.10/0.11 for mode ddos
or aggressive
.
Potential dos/ddos for sshd warning I thinks it's urgent
Well, DDOS is potentially possible for any service (sshd is not an exception here), and it is also effectively solvable using other tools, for example special rules like limiting the connection rate (total request per IP/subnet per minutes, SYN attempts on sshd or all ports), prohibiting of the port-scanning, etc.
Primary goals of Fail2ban are authentication issues, therefore enclosed in a mentioned modes only, so this is now enough as configuration to enable it (if the filter/fail2ban becomes upgraded to 0.10.5):
[sshd]
mode = aggressive
enabled = true
For fail2ban \<= 0.10.5 (but >= 0.10):
[sshd]
mode = aggressive
failregex = %(known/failregex)s
^Bad protocol version identification '.*' from <HOST>
enabled = true
For 0.9 and below see my comment above.
Most helpful comment
This are no failures in sense of authentication (because login does not take place).
But if you will that yet, just copy
filter.d/sshd.conf
intofilter.d/sshd.local
and add following to thefailregex
: