LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-02-2005, 04:47 PM   #166
michaelsanford
Member
 
Registered: Feb 2005
Location: Ottawa/Montréal
Distribution: Slackware + Darwin (MacOS X)
Posts: 468

Rep: Reputation: 30

FYI some plugins for nessusd give attack logs that look very similar!
 
Old 05-02-2005, 11:44 PM   #167
johnnydangerous
Member
 
Registered: Jan 2005
Location: Sofia, Bulgaria
Distribution: Fedora Core 4 Rawhide
Posts: 431

Rep: Reputation: 30
is there any good GUI ssh log alerter? or better to be like "allow login from xxx ?"
 
Old 05-14-2005, 09:12 PM   #168
javaroast
Member
 
Registered: Apr 2005
Posts: 131

Rep: Reputation: 19
SSH Scans

After seeing these scans on my systems I began setting up IPTables to allow access to port 22 only to specific IPs. I allow only IP's on our Public subnet and now traffic from outside of the IPs that I have is immediatly droppedl It's as simple as that, and now I have no more of these scans.

If you have dynamic ip you can easily add an allow in iptables by mac address. My home system has a dynamic IP as well and it has been trivial to add access for this system to my ssh hosts.

The solution is simple and secure. In my case I don't need to allow access to unknown hosts for ssh, but that is as it should be. If I need to give a client access to ssh for some reason I add the IP that they will be connecting from. An important part of our security policy is to know who is connecting, allow those who need access and block everything else.

Not news???? Well, I don't have these login attempts any more. The original poster does. I guess that makes this news.

Last edited by javaroast; 05-16-2005 at 06:38 AM.
 
Old 05-15-2005, 03:27 AM   #169
johnnydangerous
Member
 
Registered: Jan 2005
Location: Sofia, Bulgaria
Distribution: Fedora Core 4 Rawhide
Posts: 431

Rep: Reputation: 30
this is not news man! what if you use dynamic ip to connect to your box? there are a couple of solutions like auto-own-RBL, pam_tally, port 35 for example and so on anyone can add (pls do)
 
Old 05-16-2005, 01:00 AM   #170
johnnydangerous
Member
 
Registered: Jan 2005
Location: Sofia, Bulgaria
Distribution: Fedora Core 4 Rawhide
Posts: 431

Rep: Reputation: 30
version 4.0 of OpenSSH has the option of hashing the known-hosts
database. There is also a patch for OpenSSH 3.9 that does the same
thing. Unfortunately, the option is not turned on by default.

<http://nms.csail.mit.edu/projects/ssh/>
<http://nms.csail.mit.edu/projects/ssh/sshworm.pdf>

The fix:
<http://www.openbsd.org/cgi-bin/man.cgi?query=ssh_config>
<http://www.openbsd.org/cgi-bin/man.cgi?query=ssh-keygen>
<http://www.openbsd.org/cgi-bin/cvswe...tfile.c?rev=1.
34&content-type=text/x-cvsweb-markup> or <http://tinyurl.com/8938c>
 
Old 05-21-2005, 02:19 AM   #171
pwo0123
LQ Newbie
 
Registered: Sep 2004
Distribution: slackware 10.0, RedHat 9
Posts: 21

Rep: Reputation: 15
hey guys this might be old new but i recently got alot of ssh login tries and when i got them i usually did a port scan and i found most of the ip's had port 80 open.

just try it your self


http://206.113.8.130/ some unitel companies site, tried like 300 login

http://202.111.185.20/ Asian site

http://211.144.142.150/ another Asian site



i can post the messages if anyone wants to see the logins. but if u ask me, man thats some weird shit.
 
Old 05-21-2005, 09:14 AM   #172
johnnydangerous
Member
 
Registered: Jan 2005
Location: Sofia, Bulgaria
Distribution: Fedora Core 4 Rawhide
Posts: 431

Rep: Reputation: 30
it's not weird it's commercial shit they can spam/identity theft/check your bank account
 
Old 05-30-2005, 10:20 AM   #173
Tudor Popescu
Newbie
 
Registered: May 2005
Posts: 9

Rep: Reputation: 0
Smile

Thank you kindly. This information is very useful for me. Great site! Thanks again!

_________________________________________________________________
Link Removed by Moderator


//Moderator note: Please stop spamming our site.

Last edited by Capt_Caveman; 05-30-2005 at 09:33 PM.
 
Old 05-30-2005, 11:37 PM   #174
johnnydangerous
Member
 
Registered: Jan 2005
Location: Sofia, Bulgaria
Distribution: Fedora Core 4 Rawhide
Posts: 431

Rep: Reputation: 30
the Romanian guy is spamming the site!!!!! and this thread kind of lost focus, maybe there's some new thread where the discussion is still ongoin'?
 
Old 05-31-2005, 12:45 AM   #175
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Original Poster
Rep: Reputation: 69
I've been thinking about trimming this tread down to only the important highlights for awhile now. Maybe that was the death knell.
 
Old 05-31-2005, 01:25 AM   #176
johnnydangerous
Member
 
Registered: Jan 2005
Location: Sofia, Bulgaria
Distribution: Fedora Core 4 Rawhide
Posts: 431

Rep: Reputation: 30
Capt Caveman: respect!
 
Old 06-13-2005, 08:51 PM   #177
securehack
Member
 
Registered: Sep 2003
Location: United States
Distribution: Slackware 10.1, Debian 3.0, WinXProSP1, Fedora Core 3
Posts: 425

Rep: Reputation: 30
Wow... I wonder how many times my system has been compromised =P (just kidding).

--Abid Kazmi
 
Old 06-16-2005, 01:18 AM   #178
AAnarchYY
Member
 
Registered: Sep 2004
Location: Carlisle, MA
Distribution: Debian 8
Posts: 419

Rep: Reputation: 30
authfail

I've been getting this crap for quite a while, I origionaly just changed the ssh port to a non-standard port but that only fended off some of them. I still came home to a flooded log. I found this program called authfail http://www.bmk.bz/?p=33 that worked great for me. It by default logs 4 failed ssh login attempts from the same ip then puts the ip into iptables -j DROP all realtime. I had to hack the hell out of it to make it work(it read the ip wrong, started kinda crummy, and a few other things, and i made it add the ip to hosts.deny also), but looking at the website it appears that its been updated since i got it so maybe that stuff is fixed. Anyway, it's made my logs a whole lot smaller and keeps people from continualy hammering away at my sshd while allowing real traffic in(even with a few failed logins).
 
Old 06-16-2005, 12:27 PM   #179
johnnydangerous
Member
 
Registered: Jan 2005
Location: Sofia, Bulgaria
Distribution: Fedora Core 4 Rawhide
Posts: 431

Rep: Reputation: 30
well snort is what you need it can handle real-time drop rules.. have fun with it it's the most comprehensive out there AFAIK
 
Old 06-16-2005, 05:52 PM   #180
AAnarchYY
Member
 
Registered: Sep 2004
Location: Carlisle, MA
Distribution: Debian 8
Posts: 419

Rep: Reputation: 30
I agree johnny, snort is an excelent IDS with a plethora of configuration options, but thats one of the reasons im not using it right now. I am in the process of setting it up, but i want it quite fine-tuned before i get rid of authfail because at the moment the only crap i get is that garbage on my sshd, the rest is just idle scanning or other benign activity(and probably stuff i dont see because of a few iptables rules i have set).

The only thing authfail does is just watch your log for failed sshd attempts and after a certian (configurable) amount of fails, it adds the ip to iptalbes or wherever you tell it to put it. Considering the nature of this tool and what this thread is about, i think its the most focused tool for this job
 
  


Reply

Tags
hostsdeny, keys, ssh


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
ssh...log files that store the login attempts Bgrad Linux - Networking 4 03-29-2010 09:40 AM
Failed SSH login attempts Capt_Caveman Linux - Security 38 01-03-2006 03:22 PM
ssh login attempts from localhost?! sovietpower Linux - Security 2 05-29-2005 01:19 AM
SSH login attempts - how to get rid of the automated malware? alexberk Linux - Security 1 05-24-2005 04:57 AM
How do I block IP's to prevent unauthorized SSH login attempts? leofoxx Linux - Security 6 05-23-2005 09:36 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:03 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration