SSH server zero-day exploit - Suggestions to protect ourselves

Comment from Damien Miller (OpenSSH developer): http://lwn.net/Articles/340483/

In particular, I spent some time analysing a packet trace that he provided, but it seems to consist of simple brute-force attacks.

So, I'm not pursuaded that an 0day exists at all. The only evidence so far are some anonymous rumours and unverifiable intrusion transcripts.


My suggestion is to block SSH access on the firewall to everyone else besides your ip. On iptables:

/sbin/iptables -A INPUT --source <yourip> -p tcp --dport 22 -j ACCEPT
/sbin/iptables -A INPUT -p tcp --dport 22 -j DROP

According so the SANS post, this exploit does not work against current versions of SSH, and thus isn't really a 0day. Patch your servers, and you should be fine.


Complain to your vendors

That way everybody gets the newer version.


FYI, the original source of the story: http://romeo.copyandpaste.info/txt/ssanz-pwned.txt

There are also two similar stories (hacking astalavista.com and another site): romeo.copyandpaste.info/txt/astalavista.txt
romeo.copyandpaste.info/txt/nowayout.txt

It seems like someone has an agenda: romeo.copyandpaste.info/ ("Keep 0days private")