LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-08-2011, 10:15 AM   #1
neopandid
Member
 
Registered: Aug 2011
Location: Russia
Distribution: Debian
Posts: 32

Rep: Reputation: Disabled
When attacks happening, what should I check besides auth.log?


Hi,
My two server is under heavy attacks, this is not my normal day I can tell from log files,
Denyhost already blocked offensive ips
My concern is what should I check beside auth.log file?

All the traffic comes from two ips and they are already blocked by denyhost, the second ip started after 30 minutes
I suspect these are not bots but person because of every attempt started +/-30 sec after each other
Thanks in advance

Last edited by neopandid; 12-08-2011 at 10:20 AM. Reason: additional info added
 
Old 12-08-2011, 10:57 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Unless you explicitly configured it to use iptables Denyhosts by default uses tcp_wrappers. As I explained here there's a difference in how unwanted traffic is warded off. For attacks you want to block traffic as efficient and early as possible with the least effect on performance and security and definitely shouldn't allow it to reach the application layer.

As for your question what attacks are you talking about? When did this start? The whole machine or a specific service? What's the machines purpose? SOHO machine, Payment server, Squid host, FTP, game or whatever-else-server? Did you do anything to provoke it? Any traffic (ports, packets per second, any IDS data, etc etc?), affected system or daemon logs and performance data you should share?
 
Old 12-08-2011, 01:07 PM   #3
neopandid
Member
 
Registered: Aug 2011
Location: Russia
Distribution: Debian
Posts: 32

Original Poster
Rep: Reputation: Disabled
Thank you for your response,
I didn't configured denyhost to use iptables but I blocked two ips manually several hours after attacks started. Because I wanted to see what will going to happen. I called the first attacker's hosting company but they said they can't do anything.
My machine is a soho machine with unlimited bandwidth, open services for authenticated users proxy, sftp, transmission and simple webserver.
and No I didn't do anything to provoke.
I am not seeing any effect on performance, attacks are on specifically on sshd but these are not typical scans I can tell, I am not an cli guru so what should I check beside auth.log?
Thank you

Last edited by neopandid; 12-08-2011 at 01:12 PM. Reason: additional info added
 
Old 12-08-2011, 01:35 PM   #4
lithos
Senior Member
 
Registered: Jan 2010
Location: SI : 45.9531, 15.4894
Distribution: CentOS, OpenNA/Trustix, testing desktop openSuse 12.1 /Cinnamon/KDE4.8
Posts: 1,144

Rep: Reputation: 217Reputation: 217Reputation: 217
Hi,

if your SSH is under attack, then (you didn't specify your Sys Version, so I'll presume RHEL / CentOS)
you can look at:
/var/log/secure

also /var/log/messages
 
Old 12-10-2011, 06:30 AM   #5
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
Quote:
attacks are on specifically on sshd but these are not typical scans I can tell
Would you please elaborate. It is very difficult to make recommendations on generalities. Please consider posting a portion of the offending log entries (you can mask your IP addr if that makes you comfortable).
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
squid - prevent brute force attacks on ncsa auth qwertyjjj Linux - Software 9 08-13-2009 06:34 AM
the significance and name of the 5th column of /var/log/auth.log (ubuntu server)? CoffeeKing!!! Linux - Security 4 02-05-2009 07:32 AM
attacks to my serverr??? auth.log aspedisca Linux - Security 11 12-30-2008 07:45 PM
/var/log/auth.log doens't have correct date and hostname (Solution) alfmarius Linux - Newbie 0 10-07-2008 06:09 AM
Logging is not happening on my /var/log/boot.log Copain Linux - Security 2 09-28-2007 05:34 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:58 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration