tnich/honssh

Working with multiple honeypots behind honssh

Closed this issue · 7 comments

Hi, 

This is not a problem, just a request for advice.
What would be my best option to work with multiple honeypots behind one honssh 
gateway? Can I enter several IP addresses in the honssh config file ?

Thank you.


Original issue reported on code.google.com by sivan...@umn.edu on 4 Nov 2014 at 11:35

Hi,

Currently HonSSH only supports one honeypot behind it.
In theory it could support multiple honeypots, but I would need to figure out 
how I'd implement it. 
One of the difficulties would be, if a someone logs in via one IP, then logs in 
again via a different IP, ideally I would want them to go to the same honeypot. 

You could have multiple instances of HonSSH running on different ports on one 
box, but then you would need something to proxy requests to the different ports 
etc.

What sort of deployment scenario were you thinking of?

Cheers,
Tom

Original comment by tnn...@googlemail.com on 4 Nov 2014 at 12:44

Thanks for the quick reply Tom.
I was thinking about running honssh as my gateway in front of an openVZ server 
with multiple honeypots' instances. In my scenario, I would like attackers who 
choose different IPs to be able to login to different honeypots. Can honshh 
listen on multiple addresses ? I would then create the logic on the openVZ side 
to create a machine according to the trageted ip address from the attack. How's 
that sounds ?

Original comment by sivan...@umn.edu on 4 Nov 2014 at 1:06

Thanks for the quick reply Tom.
I was thinking about running honssh as my gateway in front of an openVZ server 
with multiple honeypots' instances. In my scenario, I would like attackers who 
choose different IPs to be able to login to different honeypots. Can honshh 
listen on multiple addresses ? I would then create the logic on the openVZ side 
to create a machine according to the trageted ip address from the attack. How's 
that sounds ?

Original comment by sivan...@umn.edu on 4 Nov 2014 at 1:06

Sounds like an interesting project.

Yes, honssh can listen on all interfaces using 0.0.0.0/0 - Just make sure you 
have a firewall rule preventing an attacker from sshing back into honssh from 
inside a honeypot, you will get some strange ssh connection loops!

Feel free to email directly to my email if you have any further queries about 
this project - I'd definatly be interested in seeing the setup and results.

Cheers,
Tom

Original comment by tnn...@googlemail.com on 4 Nov 2014 at 1:17

  • Changed state: Done
Thank you Tom. It is very nice of you to provide assistance and your personal 
email for future queries. I will go ahead and send a test email to make sure 
the email route works between us.

Some additional questions:
1. Just to verify, while honssh can listen on all interfaces, it can only open 
one ssh session to a honeypot per instance right? In other words, I cannot use 
some NAT tricks to make honssh open multiple sessions to multiple honeypots and 
trace all that happens in those sessions. Am I right ?

2. What do you think will be the HD space & ram requirements for a honssh 
gateway that sits in front of 500 honeypots and has the capability of accepting 
multiple sessions per honeypot?

Thanks again, 
Ido.

Original comment by sivan...@umn.edu on 4 Nov 2014 at 2:11

Hi Ido,

1) Correct - maybe in the distant future I will implement it :)

2) Not too sure. The number of honeypots is not really the factor as more 
honeypots does not always mean more attacks. I think an average machine should 
be able to support it though. I have a friend who is actively deploying HonSSH, 
so I can CC him on our emails if needed.

Original comment by tnn...@googlemail.com on 4 Nov 2014 at 3:13

Hi,
Have you solved this problem? How can I write a pre-auth-script file? please.