On Fri, Mar 20, 2009 at 7:25 AM, Eric Martin <freak4u...@gmail.com> wrote:
> Paul Hartman wrote:
>> On Thu, Mar 19, 2009 at 10:36 AM, Johan Blåbäck
>> <johan.bluecr...@gmail.com> wrote:
>>> I've always had usernames when it comes to sshd's log entries in
>>> auth.log, like the following:
>>>
>>> <time> <hostname> sshd[5926]: error: PAM: Authentication failure for
>>> <username> from <ip-adress>
>>
>> Well, I don't use PAM, just key-based authentication only, so I always
>> see only the IP getting rejected since it doesn't even give them a
>> place to try a user/password :) It's just weird that it is refusing a
>> connection from u...@domain rather than simply the IP. I guess they
>> could be trying to ssh u...@myhost.net or something.  The one with
>> [U2FsdGVkX19g32YZVKMsQkl+mouWITILOicY4Iq9OQo=] as the username is
>> interesting. I wonder what that's all about.
>>
>
> I too use only PubKey but they need to send a username so ssh knows
> where to look for the public key.  Your two options boil down to
>
> 1) install fail2ban (I installed it on all of my external ssh boxes and
> I love it)
> 2) change the ssh port to something other than 22 (Security by Obscurity
>  but it frees up your logs so you can see real problems).
>
> The two may me mutually exclusive as I'm not sure if you can tweak
> fail2ban's ssh rules to monitor another port.
>
> I just chock it up as log spam unless I see definite bad patterns.  But
> again, with public key access only and banning root from logging in via
> ssh I don't think anybody is getting far unless there is a flaw in ssh.

Oh, I am not concerned about the attacks. I just thought it was weird
that I saw u...@domain when I normally see only IP or only domain.
They are already refused connection as the log shows :)

Thanks,
Paul

Reply via email to