lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 01 Dec 2006 09:09:25 -0500
From: "J. Oquendo" <>
Subject: Re: SSH brute force blocking tool

Raphael Marichez wrote:
> you're fixing your script when someone shows a security hole, that's a
> good practice. But don't insult the men who mention the
> vulnerabilities... They are actually helping you, because you're improving
> your script thanks to them.

Hello... Some of you guys seriously need to do some reading and 
refreshing of your browsers... The script was fixed days ago.


Nov 27 16:31:21 local sshd[67010]: Illegal user dd from
awk '($5=="Illegal"||$6=="Illegal")&&$9=="from"{print $10}'

Would stop the insertion attack and only print out the tench field if 
fields 5, 6 and 9 match Illegal user from.

So that would pretty much minimize the attack on name insertion. If I 
wanted to I could also make sure that if someone came after field 10, 
then ignore the entire line:

Nov 27 16:31:21 local sshd[67010]: Illegal user dd from


SO let me restate. I could modify it to look at lines 5, 6, and 9 ... 
Take a look at the tenth column and if anything comes after 
that...Ignore that entire line... Should I have done so, maybe... Will I 
do so... Maybe...


And I fixed it the same day to avoid the insertion of moronic usernames. 
Read the entire thread.
My critiques comes from people who only snip out what is suitable for 
them to read.

J. Oquendo
sil . infiltrated @ net 

The happiness of society is the end of government.
John Adams

Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (5157 bytes)

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists