
[](https://crates.io/crates/drosera)
# Drosera
Drosera is a small SSH tarpit server. Inspired by [endlessh](https://nullprogram.com/blog/2019/03/22/).
When initiating a SSH session, the server first sends a version string to the client before communication begins. However, tarpits like drosera can exploit the following paragraph in the SSH specification, found in [RFC 4253](https://tools.ietf.org/html/rfc4253#page-4):
```
The server MAY send other lines of data before sending the version
string. Each line SHOULD be terminated by a Carriage Return and Line
Feed. Such lines MUST NOT begin with "SSH-", and SHOULD be encoded
in ISO-10646 UTF-8 [RFC3629] (language is not specified). Clients
MUST be able to process such lines.
```
It is thus incredibly easy to trap ill-configured clients in a tarpit by simply never sending the version string. To keep the connection alive, some data should be sent periodically.
Drosera, like its [beautiful namesake](https://en.wikipedia.org/wiki/Drosera), is designed to thrive in memory-constrained environments while feeding on the numerous blood-sucking drones seeking prey on the Internet.
## Table of Contents
- [Installation](#installation)
- [Risks](#risks)
## Installation
If you want to download and use drosera you have a couple of alternatives. If you have [cargo](https://www.rust-lang.org/tools/install) installed, you can download and install the latest published version by running the following command:
```
cargo install drosera
```
You can also download and install the bleeding edge, latest commit on master, by running the following command:
```
cargo install --git https://github.com/LimeEng/drosera
```
If you do not have cargo installed it is also possible to download a pre-built binary for either Windows, Linux or macOS from the [releases-page](https://github.com/LimeEng/drosera/releases).
## Risks
I do not recommend running drosera on anything valuable. Running tarpits servers at all might [not be a good idea](https://serverfault.com/questions/611063/does-tarpit-have-any-known-vulnerabilities-or-downsides) so make sure you know what you are doing. Worst case scenario an adversary could exploit a vulnerability in drosera to gain access to the machine it's running on. Adversaries could also launch massive denial-of-service attacks, quickly consuming what little memory is available and crashing the server.