Drosera is a small SSH tarpit server. Inspired by endlessh.
When initiating a SSH session, the server first sends a version string to the client before communication begins. However, tarpits like drosera can exploit the following paragraph in the SSH specification, found in RFC 4253:
The server MAY send other lines of data before sending the version
string. Each line SHOULD be terminated by a Carriage Return and Line
Feed. Such lines MUST NOT begin with "SSH-", and SHOULD be encoded
in ISO-10646 UTF-8 [RFC3629] (language is not specified). Clients
MUST be able to process such lines.
It is thus incredibly easy to trap ill-configured clients in a tarpit by simply never sending the version string. To keep the connection alive, some data should be sent periodically.
Drosera, like its beautiful namesake, is designed to thrive in memory-constrained environments while feeding on the numerous blood-sucking drones seeking prey on the Internet.
If you want to download and use drosera you have a couple of alternatives. If you have cargo installed, you can download and install the latest published version by running the following command:
cargo install drosera
You can also download and install the bleeding edge, latest commit on master, by running the following command:
cargo install --git https://github.com/LimeEng/drosera
If you do not have cargo installed it is also possible to download a pre-built binary for either Windows, Linux or macOS from the releases-page.
Simply run ./drosera --help to obtain the following output: ``` drosera 0.3.1 Tarpit SSH server
USAGE: drosera.exe [OPTIONS]
FLAGS: -h, --help Prints help information -V, --version Prints version information
OPTIONS:
-d, --delay
-m, --max-connections <max-connections>
The maximum number of connections maintained at once [default: 1024]
-s, --socket-addr <socket-addr> The socket address to bind to [default: 127.0.0.1:22]
```
I do not recommend running drosera on anything valuable. Running tarpits servers at all might not be a good idea so make sure you know what you are doing. An adversary might even be able to exploit a vulnerability in drosera to gain access to the machine it's running on. Adversaries could also launch massive denial-of-service attacks, quickly consuming what little memory is available and crashing the server.