SSH brute force protection

Bug #1576225 reported by OpenStack Infra
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Fuel for OpenStack
Confirmed
Undecided
Fuel Documentation Team

Bug Description

https://review.openstack.org/298846
Dear bug triager. This bug was created since a commit was marked with DOCIMPACT.

commit b5e7b566e1510975f0751e1690282803cd54ad6b
Author: Maksim Malchuk <email address hidden>
Date: Tue Mar 29 18:50:16 2016 +0300

    SSH brute force protection

    To block a SSH brute force attack, we just need to slow down the
    flow of requests. We can do this by rate-limiting requests to SSH
    with iptables. The benefit of using iptables to block SSH attacks
    is you don’t need any added software so we can easily support this
    solution.

    This change will block an IP if it attempts more than 3 connections
    per minute (60 seconds) to SSH. These parameters are configurable.
    Also, this protection would be enabled only if an empty ssh_network
    (set to 0.0.0.0/0 which means world-wide open) is provided.

    All SSH brute-force attempts blocked only on non-admin interface,
    because automated Fuel deployment via fuel-devops or fuel-virtualbox
    scripts are doing many connections during the installation process.

    All SSH brute-force connections are logged by default.

    DocImpact
    Depends-On: I06161e8d819e40bc5827b3fda7f614c0ea5d4fd3
    Change-Id: I0f452c8b0a808789aa4c2cd85d1d00556b210a39
    Closes-Bug: #1540073
    Signed-off-by: Maksim Malchuk <email address hidden>

Changed in fuel:
assignee: nobody → Fuel Documentation Team (fuel-docs)
status: New → Confirmed
milestone: none → 10.0
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.