-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Uwe Dippel wrote:

> I can't as of now (weekend).
> 
> But I can see it reoccurring, kind of:
> Aug 21 18:31:25 mybox sshd[31888]: Accepted password for isuser from
> XXX.XX.XX.XX port 57519 ssh2
> in authlog, reflected pretty well by
> isuser  ttyp0    172.16.0.35              Fri Aug 21 18:31 - 18:31  (00:00)
> in 'last'; though still busy sending stuff forth and back:
> isuser 16994  0.0  0.8  3176  1992 ??  S      6:31PM    0:00.13 sshd:
> isuser
> 
> There are a bunch of logons of that user, of 00:00 logon duration during
> the last weeks. The only thing running from this user at this moment is
> the ssh.
> That would mean, one can log on, spawn a process, log off, and the
> process keeps running?
> Then everything could be 'fine', and the system not compromised, only
> exploited to run some ssh-tunnel or so.
> Though this behaviour of the system would be unexpected by myself.
> 
> Uwe
> 
> 

Have you considered adding a PF rule that would drop all incoming
login requests from this specific user?


- --
- -wittig http://www.robertwittig.com/
        http://robertwittig.net/
        http://robertwittig.org/
.
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iD8DBQFKjo2u4790tgvai6gRAnfmAJ48xDHpuni444P3tphuDGesI1RC9QCgprJ8
Zj25gW7lUsKbWu4nuvS/kNo=
=wFi+
-----END PGP SIGNATURE-----

Reply via email to