Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
12-09-2005, 09:16 AM
|
#1
|
Member
Registered: Jan 2003
Location: Durham UK
Distribution: openSUSE/Debian/ubuntu
Posts: 362
Rep:
|
Hacks against ssh
Hello,
Somebody or bodies are trying to hack into my server. All it does is ftp and ssh and people are trying to hack into it via ssh. In the system log there are long lists of failed login attempts with different user names. I have beefed up all the passwords, and made sure that there is no root login. Should I be doing anything else.
Something else that has started to happen is that external access to the server, ie not from the network has suddenly got very slow. But from within the network is fine. Can anyone think why this might be, the upload/download seems to be the same as before and I can surf the net from the server without problems.
Cheers,
Phil
|
|
|
12-09-2005, 09:18 AM
|
#2
|
Senior Member
Registered: Sep 2005
Location: Out
Posts: 3,307
Rep:
|
|
|
|
12-09-2005, 09:24 AM
|
#3
|
Member
Registered: Jan 2003
Location: Durham UK
Distribution: openSUSE/Debian/ubuntu
Posts: 362
Original Poster
Rep:
|
Hi
Thanks for that, I should have look more carefully but its the first time I have been hacked. Exciting stuff  Looks like this tool is being used on me also. About every two days it would seem.
Cheers,
Phil
|
|
|
12-09-2005, 12:45 PM
|
#4
|
Member
Registered: Sep 2002
Posts: 310
Rep: 
|
You're not necessarily being compromised each time the attack ensues. Check your /var/log/auth.log to see if there are any unauthorized logins.
|
|
|
12-14-2005, 08:13 AM
|
#5
|
Member
Registered: Jan 2003
Location: Durham UK
Distribution: openSUSE/Debian/ubuntu
Posts: 362
Original Poster
Rep:
|
No, your right. I should have said, "its first time someones attempted to hack my server". As the person appears to have failed. This tool they are using that tests a list of names didn't get the login.
Cheers,
Phil
|
|
|
12-14-2005, 09:41 AM
|
#6
|
LQ Guru
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 11,187
|
As others have said, the strongest defense is to disallow password logins completely, using only digital certificates.
If you don't have a badge, you can't come in. And there's no way for you to "fake" a badge.
|
|
|
All times are GMT -5. The time now is 05:34 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|