From ArchWiki
Revision as of 10:51, 4 April 2016 by Lahwaacz (talk | contribs) (upstream uses mostly pam_abl (with underscore))
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

pam_abl provides another layer of security against brute-force SSH password guessing. It allows you to set a maximum number of unsuccessful login attempts within a given time period, after which a host and/or user is blacklisted. Once a host/user is blacklisted, all authentication attempts will fail even if the correct password is given. Hosts/users which stop attempting to login for a specified period of time will be removed from the blacklist.


Install the pam_ablAUR PKGBUILD from the AUR using makepkg.


Add pam_abl to the PAM auth stack

Open /etc/pam.d/sshd as root in your editor of choice. Add the following line above all other lines:

auth            required config=/etc/security/pam_abl.conf

Assuming you haven't made any other modifications, your /etc/pam.d/sshd should now look like this:

auth            required config=/etc/security/pam_abl.conf
auth            include         system-login
account         include         system-login
password        include         system-login
session         include         system-login

Note that this only enables pam_abl for ssh. Other services will not be affected.

Create pam_abl.conf

Create /etc/security/pam_abl.conf by copying over the sample configuration file:

# cp /etc/security/pam_abl.conf.example /etc/security/pam_abl.conf

As of version 0.6.0, the sample configuration looks like this:

host_clear_cmd=[logger] [clear] [host] [%h]
host_block_cmd=[logger] [block] [host] [%h]
user_clear_cmd=[logger] [clear] [user] [%u]
user_block_cmd=[logger] [block] [user] [%u]

See man pam_abl.conf for details on how to customize the rules and other settings.

Create the blacklist databases

As root, create the directory for the database (assuming you specified the recommended path above):

# mkdir /var/lib/abl

As root, run the pam_abl utility to initialize the databases:

# pam_abl

That's it! Pam_abl should now be working. Since PAM is not a daemon, nothing needs to be restarted for these changes to take effect. It's strongly recommended to verify that pam_abl is working by purposely getting a remote host blacklisted. Don't worry though! For directions on how to manually remove a host or user from the blacklist, see below.

Managing the blacklist databases

Check blacklisted hosts/users

As root, simply run:

# pam_abl
Note: As pam_abl does not run as a daemon, it performs "lazy purging" of the blacklist. In other words, it does not remove users/hosts from the blacklist until an authentication attempt occurs. This does not affect functionality, although it will frequently cause extra failures to show up when running the above command. To force a purge, run:
# pam_abl -p

Manually removed a host or user from the blacklist

As root, simply run:

# pam_abl -w -U <user>


# pam_abl -w -H <host>

Using * as a wildcard to match multiple hosts/users is allowed in both of the above commands.

Manually add a host or user to the blacklist

As root, simply run:

# pam_abl -f -U <user>


# pam_abl -f -H <host>

Other pam_abl commands

Like virtually all linux utilities, a manpage is available to see all options:

$ man pam_abl

Known Issues

The current version (0.6.0) of pam_abl has a problem that can affect its ability to blacklist under specific conditions.

Due to the way sshd operates and the way pam modules are passed information, failure of a given attempt is not logged until either a second attempt is made or the connection is closed. This means that long as the attacker only makes one attempt per connection, and never closes any connections, no failures are ever logged.

In practice, the sshd_config settings "MaxStartups" (default 10) and to a lesser degree "LoginGraceTime" (default 120s) limit the viability of this approach, but it still could be used to squeeze out more attempts then you specify.

In the meantime, the workaround is to set "MaxAuthTries" to 1 (or expect that an additional "MaxStartups" number of attempts could be made above and beyond what you specify in your pam_abl config).