2007/10/9, T o n g <[EMAIL PROTECTED]>:
> [The is a security configuration question. Let me try it here to see if I
> can some valuable inputs before heading to newsgroup]
>
> Hi,
>
> I used to turn on my sshd just in case that I need to ssh back into my
> box. But recently, I noticed that whenever I turn it on, almost instantly,
> there will be a cracker attempting cracking into my sshd:
>
>  $ tail -15 /var/log/auth.log
>  Oct  6 10:52:05 cxmr sshd[7374]: Invalid user deutch from 220.229.57.152
>  Oct  6 10:52:05 cxmr sshd[7374]: Address 220.229.57.152 maps to 
> adsl-220-229-57-152.kh.sparqnet.net, but this does not map back to the 
> address - POSSIBLE BREAK-IN ATTEMPT!
>  Oct  6 10:52:05 cxmr sshd[7374]: (pam_unix) check pass; user unknown
>  Oct  6 10:52:05 cxmr sshd[7374]: (pam_unix) authentication failure; logname= 
> uid=0 euid=0 tty=ssh ruser= rhost=220.229.57.152
>  Oct  6 10:52:07 cxmr sshd[7374]: Failed password for invalid user deutch 
> from 220.229.57.152 port 46369 ssh2
>  Oct  6 10:52:10 cxmr sshd[7379]: Invalid user german from 220.229.57.152
>  Oct  6 10:52:10 cxmr sshd[7379]: Address 220.229.57.152 maps to 
> adsl-220-229-57-152.kh.sparqnet.net, but this does not map back to the 
> address - POSSIBLE BREAK-IN ATTEMPT!
>  Oct  6 10:52:10 cxmr sshd[7379]: (pam_unix) check pass; user unknown
>  Oct  6 10:52:10 cxmr sshd[7379]: (pam_unix) authentication failure; logname= 
> uid=0 euid=0 tty=ssh ruser= rhost=220.229.57.152
>  Oct  6 10:52:12 cxmr sshd[7379]: Failed password for invalid user german 
> from 220.229.57.152 port 46536 ssh2
>  Oct  6 10:52:20 cxmr sshd[7384]: Invalid user hitler from 220.229.57.152
>  Oct  6 10:52:20 cxmr sshd[7384]: Address 220.229.57.152 maps to 
> adsl-220-229-57-152.kh.sparqnet.net, but this does not map back to the 
> address - POSSIBLE BREAK-IN ATTEMPT!
>  Oct  6 10:52:20 cxmr sshd[7384]: (pam_unix) check pass; user unknown
>  Oct  6 10:52:20 cxmr sshd[7384]: (pam_unix) authentication failure; logname= 
> uid=0 euid=0 tty=ssh ruser= rhost=220.229.57.152
>  Oct  6 10:52:22 cxmr sshd[7384]: Failed password for invalid user hitler 
> from 220.229.57.152 port 46858 ssh2
>
> What's your recommendation to such situation?
>
> PS.
>
> 1. I used to track down their ISP and complain about the cracking attempts,
> but nobody seems to be listening to me, and there has never been any
> responses.
>
> 2. I think the (default Debian) sshd configuration should be changed. Even
> when someone attempts cracking by typing in user names and passwords
> manually in front of tty will be penalized. But I've notice my sshd joyfully
> allows thousands of cracking attempts within minutes. This is rather silly,
> or incompetent.
>
> Please comment.
>
> thanks


Hello,

you can install denyhosts:

$ apt-cache search denyhosts
denyhosts - an utility to help sys admins thwart ssh hackers

or you can change the default ssh port.

Best regards,
Sergio Cuellar


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to