[BlueOnyx:12876] Re: Renaming user accounts
Eric Peabody
admin at bnserve.com
Wed Apr 17 09:28:30 -05 2013
Chris,
We are seeing multiple addresses used to attack a single account and
each address is used just a few times. Pam_abl can block these for some
attack vectors, and it does if the number of attempts exceeds the
threshold, but the attack continues from other addresses until the user
account is blocked. Of course, since pam_abl doesn't block sendmail
auth attempts by IP address, such attacks make keeping the user
threshold high a risky idea.
This behavior of using multiple addresses is similar to the Wordpress
attacks that have been making the rounds. The bigger hosts have
reported that some 90,000 addresses are used in these attacks. We are
much smaller and have only logged about 4000 unique addresses banned in
the past month on one server. That's ban events from fail2ban since
pam_abl doesn't prevent sendmail authentication attempts by IP address,
only user name. There were 44,000 sendmail auth errors logged on that
box from password guessing and 11,000 dovecot authentication errors.
Clearly, sendmail auth is a bigger problem.
All in all, giving user's accounts user names that are different from
their email addresses and not named with common words is a reasonable
way to reduce the exposure.
To reduce the Wordpress problem, we've implemented Apache authentication
system-wide for all Wordpress logins -- two logins are required and we
control the ones for Apache so they are much more difficult than a user
is likely to choose. Once we have verified that no Wordpress accounts
named 'admin' are being used we may remove the additional sign-in but
that's not certain. I am sure it's what my user's want but we'll have
to see how this plays out. Note that pam_abl does not address this
attack vector. And with a zombie network being used to attack, fail2ban
is limited too.
I think we are seeing a shift in the technology used to penetrate
systems. What used to be an annoyance that was pretty easy to handle
has become much more difficult. I don't think that the community has
the tools needed to thwart long-running penetration attempts run from a
zombie network that is global in scope. User name/password
authentication may not be enough any more.
Eric
On 4/17/13 8:34 AM, Chris Gebhardt - VIRTBIZ Internet wrote:
> On 4/17/2013 8:27 AM, Eric Peabody wrote:
>> Chris,
>>
>> You are right that pam_abl will help prevent the attacker from
>> successfully guessing the password. But the problem is that pam_abl
>> locks the accounts when the attacks are running, preventing the
>> legitimate users from accessing their accounts. Changing the user name
>> associated with the email address has significantly reduced the
>> unauthorized activity's interference with legitimate operations.
> In the BlueOnyx GUI, make sure that in Server Management > Security >
> Login Manager you are only using the HOST RULE and not the USER RULE.
> That way, only offending IP addresses will be blocked, not a username.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.blueonyx.it/pipermail/blueonyx/attachments/20130417/296e1ea0/attachment.html>
More information about the Blueonyx
mailing list