LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-11-2006, 09:52 PM   #1
wlaukaitis
LQ Newbie
 
Registered: Jan 2006
Posts: 8

Rep: Reputation: 0
Exclamation OK, whats this in my var/log/secure????


Hi Folks,

I am new to linux and I was poking around in /var/log/* I found a lot of "stuff" in the secure file as well as messages

Here is some of the stuff in /var/log/secure

Feb 10 21:49:53 localhost sshd[7857]: Failed password for invalid user admins from 218.146.254.87 port 51145 ssh2
Feb 10 21:49:57 localhost sshd[7859]: Failed password for bin from 218.146.254.87 port 51205 ssh2
Feb 10 21:50:02 localhost sshd[7862]: Failed password for daemon from 218.146.254.87 port 51649 ssh2
Feb 10 21:50:06 localhost sshd[7864]: Failed password for lp from 218.146.254.87 port 52100 ssh2
Feb 10 21:50:11 localhost sshd[7866]: Failed password for sync from 218.146.254.87 port 52565 ssh2
Feb 10 21:50:15 localhost sshd[7869]: Failed password for shutdown from 218.146.254.87 port 53002 ssh2
Feb 10 21:50:19 localhost sshd[7871]: Failed password for halt from 218.146.254.87 port 53460 ssh2
Feb 10 21:50:24 localhost sshd[7873]: Failed password for uucp from 218.146.254.87 port 53928 ssh2
Feb 10 21:50:28 localhost sshd[7875]: Failed password for smmsp from 218.146.254.87 port 54389 ssh2


And here is some from /var/log/messages

eb 11 22:35:11 localhost sshd(pam_unix)[16645]: check pass; user unknown
Feb 11 22:35:11 localhost sshd(pam_unix)[16645]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=spcomputing.demon.co.uk
Feb 11 22:35:15 localhost sshd(pam_unix)[16648]: check pass; user unknown
Feb 11 22:35:15 localhost sshd(pam_unix)[16648]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=spcomputing.demon.co.uk
Feb 11 22:35:20 localhost sshd(pam_unix)[16650]: check pass; user unknown
Feb 11 22:35:20 localhost sshd(pam_unix)[16650]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=spcomputing.demon.co.uk
Feb 11 22:35:26 localhost sshd(pam_unix)[16652]: check pass; user unknown
Feb 11 22:35:26 localhost sshd(pam_unix)[16652]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=spcomputing.demon.co.uk
Feb 11 22:35:36 localhost sshd(pam_unix)[16655]: check pass; user unknown
Feb 11 22:35:36 localhost sshd(pam_unix)[16655]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=spcomputing.demon.co.uk
Feb 11 22:35:42 localhost sshd(pam_unix)[16657]: check pass; user unknown
Feb 11 22:35:42 localhost sshd(pam_unix)[16657]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=spcomputing.demon.co.uk
Feb 11 22:35:50 localhost sshd(pam_unix)[16660]: check pass; user unknown
Feb 11 22:35:50 localhost sshd(pam_unix)[16660]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=spcomputing.demon.co.uk
Feb 11 22:35:58 localhost sshd(pam_unix)[16662]: check pass; user unknown
Feb 11 22:35:58 localhost sshd(pam_unix)[16662]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=spcomputing.demon.co.uk
Feb 11 22:36:10 localhost sshd(pam_unix)[16679]: check pass; user unknown
Feb 11 22:36:10 localhost sshd(pam_unix)[16679]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=spcomputing.demon.co.uk


Is this something to be concerned with??
I do have a port open which has been closed. Is having a port open on my router for ssh bad??

Thank you for your time!
 
Old 02-11-2006, 10:57 PM   #2
~=gr3p=~
Member
 
Registered: Feb 2005
Location: ~h3av3n~
Distribution: RHEL 4, Fedora Core 3,6,7 Centos 5, Ubuntu 7.04
Posts: 227

Rep: Reputation: 30
ha ha welcome to Failed SSH logins.

http://www.linuxquestions.org/questi...d.php?t=340366
 
Old 02-12-2006, 07:16 PM   #3
wlaukaitis
LQ Newbie
 
Registered: Jan 2006
Posts: 8

Original Poster
Rep: Reputation: 0
I suppose this is normal?

Should I be concerned about it?

Thanks!
 
Old 02-12-2006, 07:46 PM   #4
gilead
Senior Member
 
Registered: Dec 2005
Location: Brisbane, Australia
Distribution: Slackware64 14.0
Posts: 4,141

Rep: Reputation: 168Reputation: 168
If you have strong passwords (better, use keys instead of passwords for your remote connections), no root login allowed (use su), and protocol 2 only then you have a strong base set up. Googling on securing ssh returns a bunch of sites for further tweaks.
 
Old 02-12-2006, 07:48 PM   #5
frob23
Senior Member
 
Registered: Jan 2004
Location: Roughly 29.467N / 81.206W
Distribution: OpenBSD, Debian, FreeBSD
Posts: 1,450

Rep: Reputation: 48
Yep, it is normal and it's no great concern. You should make sure all non-user accounts have a * in their password field and an invalid shell -- but this is the default situation on every system I have seen.

Also, disable root login for ssh (probably already done as a default) and make sure all your users have good passwords. And/or you can limit the users who can login through ssh as well -- if you have several users who should never connect remotely.

But... for the most part... you have little to worry about. These automated scripts are very common but not very effective against machines which weren't massively misconfigured.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
/var/log/secure format Latem Linux - Security 1 07-24-2005 08:00 PM
/var/log/secure ??? MikeFoo1 Linux - Security 2 06-22-2005 03:42 AM
/var/log/secure allelopath SUSE / openSUSE 3 02-15-2005 08:56 AM
entries in /var/log/secure zepplin611 Linux - Newbie 1 07-20-2004 05:57 PM
/var/log/secure dragon Linux - Security 6 12-02-2003 08:45 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:07 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration