sbthomas wrote:
CyberNut - I am a computer security professional and completely disagree that mentioning the ssh username in this forum makes your device any more vulnerable. The username is standard in all linux distros and I have had brute force attempts utilizing all default l inux accounts for years. That being said, listing the ssh username here certainly does not make things more secure and i will edit my post to remove the name of the user.
If you are really concerned about security, you should be paying attention to the point of my original post. The root account IS allowed to ssh in to the NAS and has a password set. A password which I believe is not set by the end user and may be standard across devices. You should be confident in the complexity of your ssh user password. What makes me uncertain is I do not know the root password. I was hoping someone on here may have input. I certainly wouldn’t open my WD2 to the internet without resolving this question.
david001 - A local firewall enabled on the device is a great idea. Although restricting by IP is difficult, but perhaps if they implemented a geolocation option to disallow all attempts from foreign countries… Good feature request.
sbthomas - I appreciate you editing your post to remove that username. Thank you.
But I want to say a few things. I agree on your point that I should derive confidence on the complexity of my ssh user password. That is true. I also agree, that there is a root login whose password is probably the same across this product. But I am certain WD has made it enormously complex to crack unless someone uses a sustained brute force attack lasting a very long period of time. So yes, that risk does exist but that risk, in my humble opinion, is quite likely much smaller than a user who creates maybe not as complex a password for their login and that username becomes available here. Yes, I know it’d be the user’s responsibility at that point to create a strong enough password, but users vary in their tech and security knowledge and skills and therefore not all users can be expected to think about the complexity of the password.
However, I disagree on a couple things:
First, a very diligent and detemined hacker who can figure out what the device they are trying to break-in is, could go into the product’s forums (here). And if it brings them here, you can be assured they would search for thread topics just like this one and if in there they find the right username, it just makes their task much easier. So I disagree with your assessment that mentioning the username here does not make it any more vulnerable. Yes, the risk is relatively small…but it is there. But I appreciate that you did remove it from your post.
And second, the ssh login username is not a standard across all linux distros. I have been using Oracle linux for years now, which is a fork of the Red Hat Linux and it does not have that username. I also have not encountered that username in many other linux distros that I have used occassionally. In fact, that username has been attempted by less than 0.01% of all the attempts on my EX2…because mostly they are trying to get in as root. They do use plenty of other usernames but the SSH username used for EX2 is one they almost never try. But if they did know that it is a valid username, my guess is that username will jump to the top of their list.
The other thing that I am a bit surprised about is that you as a security pro think that firewalling foreign countries using geolocation would make much of a difference. I will just point you to this SSH log listing from my own EX2 that was captured over 3 days in December → http://pastebin.com/mdG9yAGb
I have removed one column from the log (to hide crucial info) but everything else is there. This will show you the mind-boggling breadth of countries in which hackers have access to compromised computers. If you look at the sustained attack that was launched by one hacker from the beginning of the log, you’ll see that many of the computers are located in US (and plenty from outside as well). And that is a common occurence today. From your line of work you would be already aware of this fact…that a lot of US companies are playing the unwitting role of accomplices to foreign attacks thanks to countless compromised computers. And the attacks shown in the log probably does not include many other computers in the hacker’s arsenal because in the preceding several months, I have been manually blocking in my router’s firewall lots of IP address chunks (chunks of 65K addresses for each unique IP I would see in my logs… e.g. if I see 123.123.110.110, I’d block every IP beginning with 123.123, for a total of 65K addresses per chunk). So these log entries were from a sustained attack by almost certainly one attacker that lasted for several days (I only included 3 days) from a global bank of zombie computers that the hacker has access to, barring the ones that I had already blocked in my router’s firewall.
Anyway, I appreciate your co-operation with my request.