TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Endlessh-go: a Golang SSH tarpit that traps bots/scanners

190 点作者 fastily大约 1 年前

10 条评论

gnfargbl大约 1 年前
Golang works well for this application because it can easily cope with very large numbers of idle goroutines.<p>What the author may be missing is that golang also works well for bots and scanners, for exactly the same reason. Attackers&#x27; time isn&#x27;t being &quot;wasted&quot; by this, their goroutines are just sitting idle for longer.
评论 #39852678 未加载
评论 #39849650 未加载
Svip大约 1 年前
The original endlessh hints at this, but doesn&#x27;t go further into details, and the endlessh-go&#x27;s README doesn&#x27;t mention it at all. Am I suppose to have endlessh run on port 22 and then have my real SSH server run on an obscure port? In none of the examples does it run on port 22. I feel like I&#x27;m missing something obvious, that the READMEs simply take for granted I know.
评论 #39851960 未加载
评论 #39852054 未加载
评论 #39849321 未加载
评论 #39849771 未加载
评论 #39849236 未加载
ok123456大约 1 年前
Following the SSH hardening guide stops 99% of bots and scanners because they can&#x27;t negotiate a cipher using whatever ancient ones their SSH implementation is set up to use.
评论 #39852865 未加载
daghamm大约 1 年前
But the bots can easily detect these, cant they? As long as there is a timeout on socket read, this shouldn&#x27;t waste that much of the scanners time.<p>Or am I misunderstanding this?
评论 #39852078 未加载
评论 #39852259 未加载
评论 #39851091 未加载
INTPenis大约 1 年前
Funny but my first thought wasn&#x27;t wasting their time at all, that&#x27;s easily fixed with a few code adjustments on their client end. My thought was to harvest their IPs and publish them in blocklists.
评论 #39854811 未加载
评论 #39856447 未加载
评论 #39868045 未加载
sandos大约 1 年前
I think you could employ the same tactics that advanced fuzzers do with these tarpits: then mutate the responses randomly, to try get &quot;new&quot; responses from the attackers, instead of new coverage in the code as in the fuzzer. Unless they are using static scripts, which would be boring.<p>I have understood that most attacks are super-simple sort of, so probably not much to learn there. But an interesting project!
lez大约 1 年前
For other usecases there is an ipfilter target TARPIT, that does a similar thing on the TCP level.
hwbunny大约 1 年前
But why? Just hide your ssh port. And port knock in. Or put it @ tor&#x2F;wg&#x2F;whatever.
schlonger0009大约 1 年前
Does it matter, though? You can easily scan out the correct SSH port.
评论 #39849260 未加载
评论 #39849242 未加载
评论 #39850657 未加载
评论 #39849280 未加载
评论 #39849241 未加载
HumblyTossed大约 1 年前
&gt; Unfortunately the wonderful original C implementation of endlessh only provides text based log, but I do not like the solution that writes extra scripts to parse the log outputs, then exports the results to a dashboard, because it would introduce extra layers in my current setup and it would depend on the format of the text log file rather than some structured data. Thus I create this golang implementation of endlessh to export Prometheus metrics and a Grafana dashboard to visualize them.<p>&quot; I didn&#x27;t like the logging, so I re-implemented the entire thing.&quot;<p>I&#x27;m not mocking, I just see this often (and have done it myself!). It&#x27;s interesting the things we do to get around the little things we don&#x27;t like.
评论 #39851106 未加载
评论 #39851991 未加载
评论 #39856481 未加载
评论 #39852204 未加载