[LAD] [ot] - NEED some security advise PLEASE!
Fernando Lopez-Lezcano
nando at ccrma.Stanford.EDU
Sun Feb 15 03:01:29 UTC 2009
On Sun, 2009-02-15 at 01:14 +0000, pete shorthose wrote:
> On Sun, 15 Feb 2009 00:43:17 +0100
> Fons Adriaensen <fons at kokkinizita.net> wrote:
>
> > On Sat, Feb 14, 2009 at 11:55:13PM +0100, Julien Claassen wrote:
> >
> > > 8226 ? Ss 0:00 sshd: unknown [priv]
> > > 8227 ? S 0:00 sshd: unknown [net]
> >
> > > Just before that I only saw "sshd [accept]" and "sshd [net]".
> > > Shutdown sshd and made new password and restarted sshd. Now it's the same.
> > > Can I easily check where it's coming from and what it's doing. I don't see
> > > anything besides those two lines. No other strange processes.
> >
> > Someone is trying a ssh login - usually from the former
> > east block - and probably trying a list of user names
> > and passwords. Do (as root) tail -50 /var/log/secure
> > to see the show.
> >
> > It happens here all the time. As long as you don't have
> > any easily guessed user/passwd combinations the danger
> > is limited, and closing your network connection for a
> > minute usually makes them go away. Configuring sshd to
> > allow only dsa authentication is better of course.
>
> I changed the port sshd runs on because I got sick of the
> clickety click as logs were written due to brute force login
> attempts. Not an option for everyone but it did the trick
> nicely for me. Port knocking is another option.
Another option is a service called denyhosts, it adds entries
to /etc/hosts.deny for each host from which a defined number of failed
logins happen. So the attacking hosts are dropped out as they try
passwords and hopefully fail...
http://denyhosts.sourceforge.net/
-- Fernando
More information about the Linux-audio-dev
mailing list