From: Moe Trin on
On Mon, 21 Dec 2009, in the Usenet newsgroup comp.unix.bsd.freebsd.misc, in
article <aaa47b0c-7ac7-4828-a906-598f3b9e3cfc(a)v30g2000yqm.googlegroups.com>,
John Rushford wrote:

NOTE: Posting from groups.google.com (or some web-forums) dramatically
reduces the chance of your post being seen. Find a real news server.

>Moe Trin) wrote:

>> Why are you allowing everywhere else? World traveler who might be
>> in Kazakhstan, Kenya, Kiribati, Korea, or Kuwait tomorrow?

>I do travel, I spent 3 weeks in the Philippines the summer before
>last building homes with a church group in one of the provinces.

That was what - 15 months ago?

>It was handy to ssh into my mail server when I could get an internet
>connection. I had asterisk running on it back then and used it to
>make phone calls to relatives in the states.

"World travelers" are better suited using a crude port knocking
technique. I'm _not_ referring to quickie connection attempts to 5
to 10 different ports in a given sequence, and using that as the
authentication _replacement_ scheme. Rather, make a single attempt
to some _unused_ (meaning closed) port such as 70/tcp, 113/tcp or
similar. The firewall notes the (failed) connection attempt, and opens
the port where the SSH server lives for a one minute period for the
address that tried to connect. The remote has a minute to connect
and the "established" rule then holds the port open for that
"conversation". You mention using a port blocker thingy that's a
perl script - you can do the same thing by just causing the script
to monitor the logs for connection attempts to your secret port and
making the temporary firewall rule change. This isn't "security
through obscurity" because when the port opens, you still have to
supply the existing login and authentication tokens. All this is
doing is dramatically reducing the number of people able to access
the SSH server to run dictionary attacks by adding an additional hoop
to jump through. The concept isn't new - I worked at a place that
used this technique to protect their "telnet" server, which might
give a clue that it was close to twenty years ago.

The reason I do not recommend complicated port knocking sequences is
that they are a pain to set up, and those secret ports that you may
want to use may be blocked by the firewall at the site you are trying
to connect from. An example is port 25/tcp - smart providers block
users trying to connect to that port on systems OUTSIDE of their net
in an attempt to prevent being abused by spammers and causing the ISP
to wind up on one or more DNSbl. If you as a customer want to send
mail, you forward it to the local ISPs mail or mail-submission server,
and they do the forwarding to the eventual destination (sendmail calls
it "smarthost"). Some providers block direct web access, preferring
you to connect through their proxy (for any number of reasons) as
another example of blocked ports.

Words to live by: Don't overdo it - it's your foot you're shooting.

>So what to allow and what to block.....

The standard answer is to block address ranges that you don't have
a reason to think you will need to use in the immediate future. 15
months is not "immediate".

>Currently, I have about 2300 blocked IP's in the table and have been
>watching it for a performance problem. Have not seen any problems
>thus far. I may fiddle with the script and keep track of when the
>rule was added and then have another script remove them after they've
>aged for say an hour.

That would work if you want to roll your own. There are a number of
these tools around - most are some form of script. I don't bother
using them, because my server only accepts connections from a limited
number of addresses (and I do use the above style of port-knocking
when traveling and not knowing the suitable addresses at the remote
site).

>As far as using google groups is concerned, its all I can find that's
>free.

The 'NOTE:' is automatically added by my news tool when ever I am
replying to a post originating at google. The rational is that there
is enough spam/abuse from that source that people set their news tool
to filter off such posts - and filtered means not seen or read.

google is a search engine. So how about an article posted to the
Usenet newsgroup "news.software.readers" on 3 Oct 2008 12:12:05 -0700
with Message-ID <qdWdnUqP5sgc83vVnZ2dnUVZ_s_inZ2d(a)earthlink.com>
which lists a few, or hit the newsgroups "alt.free.newsservers" or
"alt.comp.freeware". Here's an example snippet from one post:

--------
The following brief list of free text news servers is in alphabetical
order without editorial comment. It's a short list. Check out the
servers and decide for yourself which one is best for you. No one knows
what works for you better than you do.

AIOE http://news.aioe.org/
Albasani http://albasani.net/index.html.en
CNNTP http://www.cnntp.org/cnntp
ETT http://news.ett.com.ua/
Eternal September (Formerly Motzarella) http://www.eternal-september.org/
Solani http://news.solani.org/
Tornevall http://news.tornevall.net/
Usenet4all http://www.usenet4all.se (blocks all posts from Google)
--------

Another place to look might be
http://www.dmoz.org/Computers/Usenet/Public_News_Servers/)

Old guy
From: Michael Sierchio on


> "World travelers" are better suited using a crude port knocking
> technique. I'm _not_ referring to quickie connection attempts to 5
> to 10 different ports in a given sequence, and using that as the
> authentication _replacement_ scheme. Rather, make a single attempt
> to some _unused_ (meaning closed) port such as 70/tcp, 113/tcp or
> similar.

Far better to use one of the authenticate firewall traversal
port knockers, such as doormand.

- M
From: Moe Trin on
On Wed, 23 Dec 2009, in the Usenet newsgroup comp.unix.bsd.freebsd.misc, in
article <97KdnQ-wJ8uzx6_WnZ2dnUVZ_vRi4p2d(a)speakeasy.net>, Michael Sierchio
wrote:

>> "World travelers" are better suited using a crude port knocking
>> technique. I'm _not_ referring to quickie connection attempts to 5
>> to 10 different ports in a given sequence, and using that as the
>> authentication _replacement_ scheme. Rather, make a single attempt
>> to some _unused_ (meaning closed) port such as 70/tcp, 113/tcp or
>> similar.

>Far better to use one of the authenticate firewall traversal
>port knockers, such as doormand.

Is 'doormand' even being maintained? Latest I see is from 2005.
What benefit does it offer? At what disadvantages? As I see it:

Benefit: Requires a UDP packet with known content that can only
be used once.

What disadvantages: Requires some media to carry raw data and some
tool to create the UDP packet. Loose that, and you are cut off.
This implies that the tool to create the UDP packet will be dependent
on the type of operating system at the remote site, and that you are
allowed to run untrusted (to them) software on their system (or you
are going to run it on a system you provide and that assumes they
will allow you to connect to their network) and that their firewall
isn't blocking the UDP ports you intend to use. It also seems to
want to know the remote IP address _in_advance_ and if I knew
that, I'd set the firewall in advance and not worry about this.

This technique won't work if you visited sites where I work. We/they
don't allow non-company computers into the building, and few of the
computers have the capability of any removable media. And these
setup/rules are not unusual in secure environments.

Sorry, but this program violates common sense, never mind the KISS
rule. Repeating:

Words to live by: Don't overdo it - it's your foot you're shooting.

The whole idea of the simple knock technique is that it requires
nothing special on the remote computer - if that system has an SSH
client, you can use that client to knock the port by telling it to
connect to the knock port rather than the actual port where the SSH
server is hiding. _Nothing_ else is needed. Oh, did someone sniff
your knock and recognize it as such? Well, then you are no worse
than if you weren't using port knocking, because the bad guy still
has to guess the username and authentication mechanism. You aren't
going to allow 'root' or 'toor' to SSH in without a password (or
use something complicated like the 86 passwords that the 'deloader'
worm of 2003 used to 0wn a shedload of windoze boxes) are you?
Port knocking is NOT a replacement for proper authentication. It's
sole purpose is to reduce the probability of the bad guys doing
dictionary attacks on the server they happened to find.

Old guy
From: Michael Sierchio on
Moe Trin wrote:

> Benefit: Requires a UDP packet with known content that can only
> be used once.

Not known content - authenticated content that requires proof-of-possession
of a private key of a registered user, using the Diffie-Hellman pairwise
master secret.
From: Frank Merlott on
On Wed, 23 Dec 2009 02:28:42 +0100, Moe Trin
<ibuprofin(a)painkiller.example.tld.invalid> wrote:

> On Tue, 22 Dec 2009, in the Usenet newsgroup comp.unix.bsd.freebsd.misc,
> in
> article <hgpl6a$rp7$1(a)news.albasani.net>, bob prohaska's usenet account
> wrote:
>
>> I've tried news.albasani.net and news.eternal-september.org, the
>> former seems to work well. Didn't have much luck (nor try very hard)
>> with the latter.
>
> A quick glance through my news spool suggests eternal-september.org
> may be more popular, but popularity is a personal opinion only.
>

I am posting this through eternal-september and so far so good. I have been
with them for a month, no downtime, great wide range of groups and great
support
at their own eternal-september.moderated group. SSL supported and posting
IP is
concealed.


--
http://www.privacylover.com