Skip to content

Commit 1a61bfe

Browse files
authored
Improved the SSH ruleset for Windows (#315)
Added a rule to detect when someone fails to authenticate with SSH successfully using public key cryptography on Windows and treat it as a failed login attempt. I tested it on the following platforms: - Windows Server 2022 - Windows 10 Pro Fixes: #314 Signed-off-by: hwmayisrvu <[email protected]>
1 parent c01345c commit 1a61bfe

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

IPBanCore/ipban.config

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -591,6 +591,7 @@
591591
(?<log>failed\s+password)\s+for\s+(invalid\s+user\s+)?(?<username>[^\s]+)\s+from\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+ssh|
592592
(?<log>did\s+not\s+receive\s+identification\s+string)\s+from\s+(?<ipaddress>[^\s]+)|
593593
(?<log>connection\s+closed)\s+by\s+((invalid\s+user\s+)?(?<username>[^\s]+)\s+)?(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|
594+
(?<log>connection\s+closed)\s+by\s+((authenticating\s+user\s+)?(?<username>[^\s]+)\s+)?(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|
594595
(?<log>disconnected\s+from)\s+(invalid\s+user\s+)?(?<username>[^\s]+)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|
595596
(?<log>disconnected\s+from)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]|
596597
(?<log>disconnected\s+from\s+authenticating\s+user)\s+(?<username>[^\s]+)\s+(?<ipaddress>[^\s]+)\s+port\s+[0-9]+\s+\[preauth\]

0 commit comments

Comments
 (0)