Grant writes: > I just upgraded ssh and when I try to restart I get: > > * Stopping sshd ... [ !! ] > > I don't see anything about it in '/var/log/sshd/current'. How can I > figure out what is wrong? I'm a little nervous because I don't want > to shut myself out of this remote server.
Uh-oh! I know how you feel, I also administrate remote servers. Is there a /var/sun/sshd.pid containing the PID of the running sshd process (you can get it via "pidof sshd")? Maybe it's missing, this would explain the failure to stop. If you think the upgrade is necessary and don't want to wait until you or s.o. else has physical access in case sshd doesn't come up again, you could try to restart sshd manually by issuing a "kill -SIGHUP $( pidof sshd )". > I also noticed many "POSSIBLE BREAK-IN ATTEMPT!" log entries for > usernames that don't exist. Anything I should do about that? I emerged failtoban recently. This allows to monitor ssh attacks (also for other services like ftp and courier), and denies the attacker's IP for a while after some login failures. This keeps sshd logs short and enhances security, in case there are users with simple passwords. Some days ago I received 34 emails from fail2ban telling me about nightly couriersmtp breakin attempts. It does nt work out-of-the-box, but isn't too hard to configure. There are some howtos, but be sure to read current ones, the configuration was changed somewhere between version 0.6 and 0.8. I can mail you my configs if you are interested. Alex -- [EMAIL PROTECTED] mailing list