<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is this an ssh brute force attack? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669379#M192171</link>
    <description>&lt;P&gt;My ASA is sending these alerts to my syslog server and I was hoping that someone could either confirm or deny that this may be an ssh brute force attack. I do realize that it may be indicative of some other separate problem, but the excessive use of failed login names makes me suspicious (this is only about a third of them):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:51:02|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "administraator" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:57|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "sql" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:52|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "sshd" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:47|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "admin" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:42|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "info" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:37|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "root" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:32|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "root" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 05:51:18 GMT</pubDate>
    <dc:creator>rweir0001</dc:creator>
    <dc:date>2019-03-12T05:51:18Z</dc:date>
    <item>
      <title>Is this an ssh brute force attack?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669379#M192171</link>
      <description>&lt;P&gt;My ASA is sending these alerts to my syslog server and I was hoping that someone could either confirm or deny that this may be an ssh brute force attack. I do realize that it may be indicative of some other separate problem, but the excessive use of failed login names makes me suspicious (this is only about a third of them):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:51:02|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "administraator" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:57|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "sql" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:52|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "sshd" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:47|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "admin" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:42|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "info" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:37|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "root" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Apr 28 2015|12:50:32|315011|72.167.47.43||||SSH session from 72.167.47.43 on interface outside2 for user "root" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669379#M192171</guid>
      <dc:creator>rweir0001</dc:creator>
      <dc:date>2019-03-12T05:51:18Z</dc:date>
    </item>
    <item>
      <title>Check these below 2 of them</title>
      <link>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669380#M192172</link>
      <description>&lt;P&gt;Check these below 2 of them supply potential fixes one states its a bug for certain platform , 2 of them are related to 8.4 are you running that ios, have you checked the caveats in the release guide for your platform to match against known bugs ?&lt;/P&gt;&lt;P&gt;http://networkengineering.stackexchange.com/questions/1438/why-do-i-get-a-timeout-when-i-connect-via-ssh-to-a-cisco-asa-even-though-manage&lt;/P&gt;&lt;P&gt;https://ccieplayground.wordpress.com/2014/04/20/asa-ssh-internal-error-and-misleading-messages/&lt;/P&gt;&lt;P&gt;https://tools.cisco.com/bugsearch/bug/CSCul04610/?referring_site=bugquickviewclick&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 07:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669380#M192172</guid>
      <dc:creator>Mark Malone</dc:creator>
      <dc:date>2015-04-29T07:56:11Z</dc:date>
    </item>
    <item>
      <title>Hi,I would not necessarily</title>
      <link>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669381#M192173</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I would not necessarily say that this might be a defect.&lt;/P&gt;&lt;P&gt;I think what you should try to do is to check for the logs for the ip address of the source which is creating the SSH connection to the ASA device.&lt;/P&gt;&lt;P&gt;Check if that is legitimate. If yes , narrow down the SSH on that specific interface to specific hots only.&lt;/P&gt;&lt;P&gt;ssh &amp;lt;Ip address&amp;gt; &amp;lt;mask&amp;gt; &amp;lt;interface&amp;gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 08:39:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669381#M192173</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-29T08:39:41Z</dc:date>
    </item>
    <item>
      <title>Thanks, markmalone2008! We</title>
      <link>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669382#M192174</link>
      <description>&lt;P&gt;Thanks, markmalone2008! We are running v8.2 ans our aaa authentication looks like it is configured correctly.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 15:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669382#M192174</guid>
      <dc:creator>rweir0001</dc:creator>
      <dc:date>2015-04-29T15:51:46Z</dc:date>
    </item>
    <item>
      <title>Thanks, Vibhor. We get</title>
      <link>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669383#M192175</link>
      <description>&lt;P&gt;Thanks, Vibhor. We get slammed with brute ssh force attacks from different IPs indicated by message event IDs like&amp;nbsp;&lt;B style="color: rgb(1, 1, 1); font-family: Calibri; font-size: 15px; line-height: normal; orphans: 2; widows: 2;"&gt;113005 and&amp;nbsp;&lt;/B&gt;&lt;B style="color: rgb(1, 1, 1); font-family: Calibri; font-size: 15px; line-height: 14px; orphans: 2; text-align: -webkit-auto; widows: 2;"&gt;611102.&amp;nbsp;&lt;/B&gt;I'm keeping a lookout for offending IPs like the one that generated the&amp;nbsp;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;315011 logs above to see if they also generate logs that clearly indicate an ssh attack. If they do, I'll probably just assume that the&amp;nbsp;315011 &amp;nbsp;events are due to ssh attacks as well.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;My other question would be how to remedy the problem of all these ssh brute force attacks? I'm not sure if I want to configure aaa lockouts on the ASA, and blacklisting multiple IPs doesn't seem practical....&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 16:00:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669383#M192175</guid>
      <dc:creator>rweir0001</dc:creator>
      <dc:date>2015-04-29T16:00:17Z</dc:date>
    </item>
    <item>
      <title>Hi,In case you see a SSH</title>
      <link>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669384#M192176</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;In case you see a SSH Attack , the best and most effective solution would be to only allow specific IP addresses to allow to ssh on the ASA device interface as this should only be open to the ADMINS and on the secured interface as a best practice.&lt;/P&gt;&lt;P&gt;We can create specific rules(COntrol Plane ACL to block port 22) for the Attacker IP/Subnets.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 16:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669384#M192176</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-29T16:28:19Z</dc:date>
    </item>
    <item>
      <title>Thanks. That is a good idea.</title>
      <link>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669385#M192177</link>
      <description>&lt;P&gt;Thanks. That is a good idea. I'll look into that.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 16:31:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-an-ssh-brute-force-attack/m-p/2669385#M192177</guid>
      <dc:creator>rweir0001</dc:creator>
      <dc:date>2015-04-29T16:31:12Z</dc:date>
    </item>
  </channel>
</rss>

