LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-14-2006, 03:19 PM   #1
The MCP
Member
 
Registered: Nov 2003
Distribution: SUSE
Posts: 31

Rep: Reputation: 15
Attack on sshd caused near-DOS


Last night I found that someone had managed to screw up my server's sshd service. Even when I stopped playing online games, the adsl modem activity lights were flashing furiously. After 'service network stop' to immediately end any intrusion, I found the problem in my logs:

Code:
Feb 13 22:39:22 server sshd[5377]: Invalid user alina from 66.221.222.19
Feb 13 22:39:27 server sshd[5377]: reverse mapping checking getaddrinfo for basicbible101.propagation.net failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 13 22:39:27 server sshd[5377]: error: Could not get shadow information for NOUSER
Feb 13 22:39:27 server sshd[5377]: Failed password for invalid user alina from 66.221.222.19 port 48544 ssh2
Feb 13 22:41:21 server sshd[5377]: fatal: Timeout before authentication for 66.221.222.19
Feb 13 22:44:44 server sshd[30631]: Received signal 15; terminating.
However, sshd did not terminate - it was still open (kill still took it down), as was my remote login. w and who didn't show anyone new logged in, ps aux showed no anomalous processes, rkhunter found nothing, and netstat -pantu showed no strange outbound connection. It also appeared to be spawning new processes at a high rate.

Anyone know what this is about? Secunia has nothing up about openssh-4.3p1 or openssl-0.9.7i vulnerabilities.
 
Old 02-14-2006, 03:46 PM   #2
gilead
Senior Member
 
Registered: Dec 2005
Location: Brisbane, Australia
Distribution: Slackware64 14.0
Posts: 4,141

Rep: Reputation: 168Reputation: 168
It looks like they didn't get in which is a god thing. Trying to crack SSH is popular at the moment - lots of dictionary attacks and scans. If you have strong passwords (or preferably, key access only) and no root login you're pretty safe. Have a look at http://www.debiansec.com/linux/services/ssh.html for a quick but useful guid to SSH config options.
 
Old 02-14-2006, 09:06 PM   #3
Matir
LQ Guru
 
Registered: Nov 2004
Location: San Jose, CA
Distribution: Debian, Arch
Posts: 8,507

Rep: Reputation: 128Reputation: 128
Yeah, this just looks like a standard SSH brute force attempt.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Linux DOS Attack Possibility chereth Linux - Security 2 02-09-2006 12:26 PM
detecting a DOS attack ignus Linux - Security 4 07-29-2004 02:17 PM
cups error log: possible DoS attack busbarn Linux - Security 1 04-30-2003 11:30 AM
Are we under DOS attack? sarmadys Linux - Security 2 02-06-2002 09:41 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:20 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration