Ebuilds are available on the website or in bugzilla.


My servers are co-located 3 stories below ground on the other side of town. I sign in from the office for daily maintenance and checks. It's not on it's own network so I don't set up a VPN connection...SSH does the job just fine for me. Like I've said before, only bots have hit my servers so changing the port seemed to do the trick.segedunum wrote:Can anyone tell me why on Earth anyone is running a damn SSH server publicly?! For goodness sake, if you need admin access to your server outside then install yourself a damn VPN to do it such as OpenVPN or an IPSec one.
If you're behind a firewall that restricts outgoings that blocks VPN connections then I could understand but that's not very likely, and even then, it would have to allow SSH to get remote access. If you're in that position then have to make a serious considered decision about whether it's worth the risk to remote admin your server through a publicly available SSH service running on it. If you're having to consider configuring your firewall to disallow bots coming from Pakistan or somewhere else, talking about portknocking, worrying about totally securing your passwords or you're having to parse your logs like crazy as a knee-jerk reaction then you're simply never going to get ahead. I can get full remote access to my server but there are no dodgy unsuccessful SSH logins in my logs.
Sorry, but I think anyone who runs anything publicly like this is just plain silly - and I'm being polite there.
The simple fact is that running any service whatsoever, on any port, is a security hazard. The only truly secure network is the one you don't build, and the only truly secure computer is in a concrete bunker, under armed guard, with console access only, etc. Even then, there are various points of attack one could use to gain access, if one really wanted to.Can anyone tell me why on Earth anyone is running a damn SSH server publicly?! For goodness sake, if you need admin access to your server outside then install yourself a damn VPN to do it such as OpenVPN or an IPSec one.

That's all well and fine until your machine is being used as a spam relay, being used as a ddos drone, or is set up to relay child porn / stolen credit card numbers etc.alex6z wrote:The thing it, when you make your box public, it defeats the point of hacking it. What's the point if the person your hacking doesn't care? Go hack your own box!
Some other box besides hers might be infested. Something must have sent those wake-on-lan packages.red-wolf76 wrote:Then she panics and shuts down her Linux box but it starts up again, as does my Win2000 box (which was off in the first place!). However - she claims - my box kept shutting down again and trying to rise a couple of times.
gaim had some security issues recently, possibly it's not over yet(she uses GAIM for that and YAHOO! on her box)
WPA is generally considered OK, but I prefer openvpn.1.) The guy came in over the router. Weird stuff stopped when it got downed, so I guess my wireless bridge is more or less secure still...

I'll check for that. Are there any good tools for finding out if your box has been rooted or otherwise infected?jamapii wrote:Some other box besides hers might be infested. Something must have sent those wake-on-lan packages.red-wolf76 wrote:Then she panics and shuts down her Linux box but it starts up again, as does my Win2000 box (which was off in the first place!). However - she claims - my box kept shutting down again and trying to rise a couple of times.
I'll turn off the direct connections for now. That ought to stop the most obvious POE.gaim had some security issues recently, possibly it's not over yet(she uses GAIM for that and YAHOO! on her box)
I'm not sure the APs are capable of that, but I'll have a look.WPA is generally considered OK, but I prefer openvpn.1.) The guy came in over the router. Weird stuff stopped when it got downed, so I guess my wireless bridge is more or less secure still...
Ah, that'll go too then, if it is installed. I do use a SMB-utility to access the Win2K file shares when necessary.The simple X window could be the Windows Message Service (if enabled in /etc/samba/smb.conf - it's "message command") (it is used in Windows to pop up windows with spam).
... and rkhunter.red-wolf76 wrote:I'll check for that. Are there any good tools for finding out if your box has been rooted or otherwise infected?
Recent APs should be capable of WPA, but openvpn is usually only done by computers. (client(s) <-> server)I'm not sure the APs are capable of that, but I'll have a look.WPA is generally considered OK, but I prefer openvpn.

Thanks for the pointers. Neither rkhunter nor chkrootkit found any abnormalities on the supposedly affected system. I do have root login over ssh enabled, but only from LAN IPs (if God is indeed merciful and my config correct) however so I can muck about on the box from my PC when my gf uses it.jamapii wrote:... and rkhunter.red-wolf76 wrote:I'll check for that. Are there any good tools for finding out if your box has been rooted or otherwise infected?Recent APs should be capable of WPA, but openvpn is usually only done by computers. (client(s) <-> server)I'm not sure the APs are capable of that, but I'll have a look.WPA is generally considered OK, but I prefer openvpn.

Actually, this seriously sounds like a Good Thing. It's what I do when I access the machines directly to avoid running KDE (or Gnome on another box) as root.Zepp wrote:Don't enable direct root login for ssh, just add whatever use you want, like yours, to the wheel group and then login to that user via ssh and su to root.

Captain_Loser wrote:Wow, I just looked through my logs and found a whole lot of failed ssh logins, and what I guess are rootkit attempts.. I am very surprised to see this many cracking attempts aimed at me. I am running a very safe system, but it makes you think.. I am sure glad gentoo has things like emerge -u.
You can use the `last` command to see users who logged into the system. Although, this can only help if attacker haven't got root access, in which case he could just change the logs.SwiftWind wrote:Holy cow...I checked my logs, there have been so many attempts. I have no idea how to check if there were any successful ones. For some reason in the SSHD folder its only keeping logs for the last 2 days. Can someone recommend what logs I should look for any successful logins? and in what directory?

Nice work alex, I have been checking the bash_history for a while now and am finding some funny things!alex6z wrote:I have (an) open account(s) on my system. I put them there to see who would login and wait and see what they try to do. I just don't get why people are so scared. They shouldn't be able to get root access from the account. I have it set up with limits and outgoing firewall so they can't use an IRC bot. So far nothing too interesting has happened .
2005-07-19 my dynamic IP is ssh://admin@12.223.170.28/ try it out. I know it's risky allowing anonymous shell access, but it's still safer than windows and I really don't care anyway, computer are just toys for me
That's the usual cop-out rubbish I'm afraid. There are certain things you can do to make your system more secure, and piping SSH and other admin tools through a VPN is definitely one of them.The simple fact is that running any service whatsoever, on any port, is a security hazard. The only truly secure network is the one you don't build, and the only truly secure computer is in a concrete bunker, under armed guard, with console access only, etc. Even then, there are various points of attack one could use to gain access, if one really wanted to.
Which is why I recommend, not unreasonably, not running SSH and piping it through something else.It is currently fashionable for 1337 $cr!p+ k!ddi3z to hit systems running SSH.
Is that more or less likely than an attack on a public SSH server resulting in a compromise?Security-compromising errors have been found before in ipsec-tools, and if one wanted one could probably attempt to mount an attack against IPSec.
Yes, and it's far more difficult to mount an attack on this than on a running, publicly available SSH server. It's going to be that much more difficult to find a compromise. It's a question of who's your worst enemy.OpenVPN is a great piece of software (I use it extensively), but I'm sure that a programming error will slip in at some point and that an attack could be devised against it.
Errr, yes - which is why I recommend piping your SSH and other admin tools through a VPN. It's the best, and most secure option. I also think you're misunderstanding things in that you're assuming that if VPN usage gets more popular than SSH then VPNs will be hacked, including Microsoft. That's normal tosh a a lot of people tend to assume. No one claims a VPN is uncompromisable, but having a VPN using a set of secured, signed and trusted certificates is going to be a heck of a lot tougher to have a script-kiddy go at than a public SSH server.But for right now, SSH is a far more inviting target: so many more people use it
I was going to take a look but ssh to thath box timed out, and nmap says italex6z wrote:I have (an) open account(s) on my system. I put them there to see who would login and wait and see what they try to do. I just don't get why people are so scared. They shouldn't be able to get root access from the account. I have it set up with limits and outgoing firewall so they can't use an IRC bot. So far nothing too interesting has happened .
2005-07-19 my dynamic IP is ssh://admin@12.223.170.28/ try it out. I know it's risky allowing anonymous shell access, but it's still safer than windows and I really don't care anyway, computer are just toys for me

note the date of that post and the fact that it's a dynamic IP (which was stated). THat's probably more the reason you can't get into it...it's somewhere else by now.labrador wrote:I was going to take a look but ssh to thath box timed out, and nmap says italex6z wrote:I have (an) open account(s) on my system. I put them there to see who would login and wait and see what they try to do. I just don't get why people are so scared. They shouldn't be able to get root access from the account. I have it set up with limits and outgoing firewall so they can't use an IRC bot. So far nothing too interesting has happened .
2005-07-19 my dynamic IP is ssh://admin@12.223.170.28/ try it out. I know it's risky allowing anonymous shell access, but it's still safer than windows and I really don't care anyway, computer are just toys for me
can't be found with a standard probe.
Have you heard of shell fork bomb attacks? Did you set up limits
to prevent that sort of abuse? Perhaps that's why I can't get on it?
There is no such thing as "safe" with a system you've set up with no
password and advertised to the whole world is wide open. Would you
leave your house unlocked, then publish an ad in the newspaper
that such and such an address is not locked?
Do you have any idea what you said? "zone alarms" possibly means a Windows software firewall known as ZoneAlarm. If you're asking to scan our computers with ZoneAlarm (again, Windows software, and it doesn't do this anyway)... Why are you posting advice when you can't even get the OS right?philidias wrote:you need to get hacking preventing software such as zone alarms. Turn off your internet connection. Scan you computer.