On Fri, Jan 16, 2009 at 02:25:35PM +0100, Florian Mickler wrote:
> On Thu, 15 Jan 2009 20:10:44 +0200
> "Dotan Cohen" <dotanco...@gmail.com> wrote:
> 
> > I get a few thousands of these every day in the logs:
> > Illegal users from:
> >     70.85.222.106 (sales.gbdweb.com): 518 times
> >        anna/password: 1 time
> >        apache/password: 1 time
> >        arthur/password: 1 time
> >        attack/password: 1 time
> >        awharton/password: 1 time
> > 
> > How can I start logging the passwords attempted as well as the
> > usernames? Thanks.
> > 
> That's not possible without hacking in the ssh-sourcecodes, I assume.

Or alternatively the pam module that is used. Openssh here checks
passwords using PAM.

> 
> It would be a security nightmare to have the passwords of users being
> logged. even if it would only be on failed attempts. 

And even then it owuld give some interesting clues, as it would also log
real passwords with typos.

> people
> often confuse which password they have to enter where, and thus valid
> passwords would wander into the logs for malicous people to collect and
> use at other sites.

auth.log is only readable to sysadmins.

-- 
Tzafrir Cohen         | tzaf...@jabber.org | VIM is
http://tzafrir.org.il |                    | a Mutt's
tzaf...@cohens.org.il |                    |  best
ICQ# 16849754         |                    | friend


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to