IPFire Core 164 Guardian blocking erroneously SSH connections?

I noticed the usual Core 164 IPS page with “please wait”

So I logged in with SSH from a local PC to clear any locks in /TMP

Right after login I got timed out.
I can’t use SSH, WUI or even ping the firewal.

Other local PC’s got banned as well, can’t connect to Internet at all.
no ping. Other PC’s are working fine.

I rebooted IPfire and everything seems to be OK,
Then I noticed Guardian Log banned the IP’s.
This has never happened before, suddenly, for no reason , it bans
is this something new to core 164?


Section 	 
guardian[15887]: 	<info> Guardian 2.0.2 successfully started...
guardian[15887]: 	<info> Blocking 192.168.1.5 for 8640000 seconds...
guardian[15887]: 	<info> port - 64922:11 SSH Possible SSH-Bruteforce Attack - failed preauth.
guardian[15887]: 	<info> Shutting down...
guardian[15854]: 	<info> Guardian 2.0.2 successfully started... 

Hi,

apologies for the late reply.

No, not that I am aware of. Guardian is quite stable and to my understanding nearly feature-complete.

Also, Core Update 164 did not update an SSH-related component on IPFire. What SSH client did you use? Are there any log messages (especially interesting would be authentication failures) related to SSH if you logon to IPFire?

Thanks, and best regards,
Peter Müller

1 Like

I have been using MobaXterm 11 which uses the Putty terminal and SSH client

Hi,

that is odd indeed then. For special or homemade SSH clients (most notably custom things built on top of libssh), sometimes the IPS complains as well, or the SSH daemon logs some messages interpreted by Guardian as a brute-force attempt.

What log messages does

grep -i sshd /var/log/messages

print if you try to log in to your IPFire machine by SSH?

Thanks, and best regards,
Peter Müller

1 Like

Guardian blocked me again. Right after update to 167,
It seems to be pattern since 164…167
1 - update
2 - reboot
3 - try to login to SSH
4 - get banned for 100 days

Mar 23 10:54:36 IPFIRE sshd[15339]: Server listening on 0.0.0.0 port 222.
Mar 23 10:54:36 IPFIRE sshd[15339]: Received signal 15; terminating.
Mar 23 10:54:36 IPFIRE sshd[15346]: Server listening on 0.0.0.0 port 222.

Mar 23 10:59:54 IPFIRE sshd[15984]: Accepted password for root from 192.168.0.89 port 52191 ssh2
Mar 23 10:59:54 IPFIRE sshd[15990]: Received disconnect from 192.168.0.89 port 52192:11: Unsupported cipher [preauth]
Mar 23 10:59:54 IPFIRE sshd[15990]: Disconnected from 192.168.0.89 port 52192 [preauth]

Mar 23 11:27:59 IPFIRE sshd[19415]: Server listening on 0.0.0.0 port 222.
Mar 23 11:27:59 IPFIRE sshd[19415]: Received signal 15; terminating.
Mar 23 11:27:59 IPFIRE sshd[19422]: Server listening on 0.0.0.0 port 222.
Mar 23 11:28:15 IPFIRE apcupsd[15874]: 000.0,000.0,121.0,00.00,00.00,03.0,00.0,000.0,000.0,121.0,100.0,0
Mar 23 11:28:15 IPFIRE sshd[19486]: Accepted password for root from 10.10.10.15 port 63819 ssh2
Mar 23 11:28:16 IPFIRE sshd[19493]: Received disconnect from 10.10.10.15 port 63820:11: Unsupported cipher [preauth]


Mar 23 11:09:41 IPFIRE sshd[15346]: Received signal 15; terminating.

Mar 23 11:27:59 IPFIRE sshd[19415]: Server listening on 0.0.0.0 port 222.
Mar 23 11:27:59 IPFIRE sshd[19415]: Received signal 15; terminating.
Mar 23 11:27:59 IPFIRE sshd[19422]: Server listening on 0.0.0.0 port 222.


Mar 23 11:29:26 IPFIRE sshd[19486]: Timeout, client not responding from user root 10.10.10.15 port 63819




 grep -i Guardian /var/log/messages
May  3 12:08:39 IPFIRE guardian[17662]: <info> Shutting down...
May  3 12:15:17 IPFIRE guardian[17272]: <info> Guardian 2.0.2 successfully started...
May  3 12:16:02 IPFIRE monit[17291]: 'messageLog' content match: May  3 00:08:39 IPFIRE guardian[17662]: <info> Shutting down...  May  3 00:15:17 IPFIRE guardian[17272]: <info> Guardian 2.0.2 successfully started...
May  3 12:23:02 IPFIRE guardian[17272]: <info> Blocking 192.168.0.89 for 8640000 seconds...
May  3 12:23:02 IPFIRE guardian[17272]: <info> port - 61904:11 SSH Possible SSH-Bruteforce Attack - failed preauth.
May  3 12:23:11 IPFIRE monit[17291]: 'messageLog' content match: May  3 00:23:02 IPFIRE guardian[17272]: <info> Blocking 192.168.0.89 for 8640000 seconds...  May  3 00:23:02 IPFIRE guardian[17272]: <info> port - 61904:11 SSH Possible SSH-Bruteforce Attack - failed preauth.
May  3 12:25:23 IPFIRE guardian[17272]: <info> Socket - User-requested action.
May  3 12:25:36 IPFIRE guardian[17272]: <info> Reloading ignore list...
May  3 12:26:16 IPFIRE monit[17291]: 'messageLog' content match: May  3 00:25:23 IPFIRE guardian[17272]: <info> Socket - User-requested action.  May  3 00:25:36 IPFIRE guardian[17272]: <info> Reloading ignore list...
[root@IPFIRE ~]#


The messages show the reason for the block.
Your client 10.10.10.15 establishes a SSH connection, which is accepted by IPFire’s sshd.
Then sshd receives a disconnect from the client, with error ‘Unsupported cipher [preauth]’.
This message is interpreted by guardian as ‘SSH brute-force attack’.

Remain two questions

  • Why refuses the client the SSH connection?
  • Why is the disconnect by the client ( not sshd ) rated as brute-force attack?
1 Like

Also client 192.168.0.89 had the same message at 10:59:54.

In both case I would look at the ssh logs on those client machines to see what they say.

You can also increase the debugging level on your client machine by adding -v or -vv or -vvv to your ssh command. These give you increasing debugging levels.

2 Likes

Hi.
:thinking:
Maybe the links below will be helpful?

If not, please tell me and I will remove my post.

Regards

1 Like

Yes all clients get basically banned from IPFire / Guardian. and have no internet until the ban is removed.

This is the only thing I could find in SSH log

(SSH-Browser) ElSSH1AuthenticationFailed(1, PUBLICKEY)
(SSH-Browser) ElSSH1AuthenticationFailed(1, PUBLICKEYAGENT)
(SSH-Browser) ElSSH1AuthenticationAttempt(1, PASSWORD)

And the debugging option is kind of missing:

It sounds like there could be something about the key and openSSH in Mobaxterm. Thank you @tphz

1 Like