I'm a littly fuzzy on your question... see if these this helps you out: Hardening PAMtrip wrote:how do you turn of passwd-less logins? and is making a passwd-less acount as easy as not typing any when creating the acount? sorry for the noobs questions but i want to know exactly what to do in the litle time i have. :D
tnx in advance
It might interest you to know that I'm not running a public SSH server, and that I do use OpenVPN to remotely administer my machine.segedunum wrote:That's the usual cop-out rubbish I'm afraid.The simple fact is that running any service whatsoever, on any port, is a security hazard. The only truly secure network is the one you don't build, and the only truly secure computer is in a concrete bunker, under armed guard, with console access only, etc. Even then, there are various points of attack one could use to gain access, if one really wanted to.
Code: Select all
Oct 2 10:52:23 [sshd] Invalid user anna from 210.6.64.3
Oct 2 10:52:31 [sshd] Invalid user arthur from 210.6.64.3
Oct 2 10:52:38 [sshd] Invalid user aron from 210.6.64.3
Oct 2 10:52:42 [sshd] Invalid user austin from 210.6.64.3
Oct 2 10:52:46 [sshd] Invalid user barbara from 210.6.64.3
Oct 2 10:52:50 [sshd] Invalid user bart from 210.6.64.3
Oct 2 10:52:53 [sshd] Invalid user ben from 210.6.64.3
Oct 2 10:52:57 [sshd] Invalid user beny from 210.6.64.3
Oct 2 10:53:02 [sshd] Invalid user bert from 210.6.64.3
Oct 2 10:53:05 [sshd] Invalid user bill from 210.6.64.3
Oct 2 10:53:13 [sshd] Invalid user bind from 210.6.64.3
Oct 2 10:53:17 [sshd] Invalid user bob from 210.6.64.3
Oct 2 10:53:20 [sshd] Invalid user bobby from 210.6.64.3
Oct 2 10:53:24 [sshd] Invalid user bret from 210.6.64.3
Oct 2 10:53:27 [sshd] Invalid user brian from 210.6.64.3
Oct 2 10:53:31 [sshd] Invalid user bruce from 210.6.64.3
Oct 2 10:53:36 [sshd] Invalid user carl from 210.6.64.3
Oct 2 10:53:39 [sshd] Invalid user carol from 210.6.64.3
Oct 2 10:53:45 [sshd] Invalid user cesar from 210.6.64.3
Oct 2 10:53:48 [sshd] Invalid user clark from 210.6.64.3
Oct 2 10:53:51 [sshd] Invalid user clinton from 210.6.64.3
Oct 2 10:53:55 [sshd] Invalid user corinna from 210.6.64.3
Oct 2 10:53:59 [sshd] Invalid user craig from 210.6.64.3
Oct 2 10:54:02 [sshd] Invalid user daniel from 210.6.64.3
Oct 2 10:54:06 [sshd] Invalid user danny from 210.6.64.3
Oct 2 10:54:11 [sshd] Invalid user dave from 210.6.64.3
Oct 2 10:54:14 [sshd] Invalid user dexter from 210.6.64.3
Oct 2 10:54:18 [sshd] Invalid user dick from 210.6.64.3
Oct 2 10:54:21 [sshd] Invalid user earl from 210.6.64.3
Oct 2 10:54:26 [sshd] Invalid user ed from 210.6.64.3
Oct 2 10:54:30 [sshd] Invalid user eddie from 210.6.64.3
Oct 2 10:54:33 [sshd] Invalid user edgar from 210.6.64.3
Oct 2 10:54:37 [sshd] Invalid user ellen from 210.6.64.3
Oct 2 10:54:40 [sshd] Invalid user emil from 210.6.64.3
Oct 2 10:54:45 [sshd] Invalid user enzo from 210.6.64.3
Oct 2 10:54:48 [sshd] Invalid user felix from 210.6.64.3
Oct 2 10:54:52 [sshd] Invalid user fred from 210.6.64.3
Oct 2 10:54:57 [sshd] Invalid user francis from 210.6.64.3
Oct 2 10:55:02 [sshd] Invalid user harry from 210.6.64.3
Oct 2 10:55:06 [sshd] Invalid user ian from 210.6.64.3
Oct 2 10:55:10 [sshd] Invalid user ismail from 210.6.64.3
Oct 2 10:55:20 [sshd] Invalid user james from 210.6.64.3
Oct 2 10:55:24 [sshd] Invalid user jesse from 210.6.64.3

sometimes but not often. I generally report those IP's to them anyways...might as well, it can't hurt anything. I've gotten three ISP's who've actually done something and asked me to let them know if things happen again.bigun89 wrote:I just grepped over my log and have about 2,000+ pages of attempts ranging back from August of this year.
All of them lame dictionary attempts. Does reporting these IP's to their respective ISP's help anything?

Ehh... that's more of security by obscurity... but at the very least will keep bot attempts out.oracleofmist wrote:on top of being behind a router firewall that drops all incoming connections except to specified ports w/ specified protocols i've also take the libery of changing my ftp, ssh services to high port numbers. good practice?

There's nothing wrong with security by obscurity, in fact it's a good practice. Just don't rely on it.bigun89 wrote:Ehh... that's more of security by obscurity... but at the very least will keep bot attempts out.oracleofmist wrote:on top of being behind a router firewall that drops all incoming connections except to specified ports w/ specified protocols i've also take the libery of changing my ftp, ssh services to high port numbers. good practice?
Code: Select all
--------------------- SSHD Begin ------------------------
Didn't receive an ident from these IPs:
xxx.xxx.com (xxx.xxx.xxx.xxx): 1 Time(s)
xxx.xxx.com (xxx.xxx.xxx.xxx): 1 Time(s)
xxx.xxx.com (xxx.xxx.xxx.xxx): 1 Time(s)
Failed logins from these:
invalid user admin (password) from ::ffff:xxx.xxx.xxx.xxx: 1 Time(s)
invalid user administrator (password) from ::ffff:xxx.xxx.xxx.xxx: 1 Time(s)
invalid user carol (password) from ::ffff:xxx.xxx.xxx.xxx: 2 Time(s)
invalid user jack (password) from ::ffff:xxx.xxx.xxx.xxx: 1 Time(s)
invalid user marvin (password) from ::ffff:xxx.xxx.xxx.xxx: 1 Time(s)
root/password from ::ffff:xxx.xxx.xxx.xxx: 31 Time(s)
Users logging in through sshd:
jblow:
xxx.xxx.net (xxx.xxx.xxx.xxx): 4 times
---------------------- SSHD End ------------------------- Code: Select all
# Send a brief alert with connection details
#
when=`/usr/bin/date`
where=`echo $SSH_CONNECTION|cut -f1 -d' '|cut -f4 -d:`
if [ -z "$SSH_TTY" ] ; then
what="Connect by $USER"
else
what="Login by $USER on $SSH_TTY"
fi
mailto=""
cc_to=""
bcc_to=""
while read address mode
do
if [ -z "$address" -o "${address:0:1}" = "#" ] ; then continue; fi
if [ "x$mode" = "xcc" -o "x$mode" = "xCC" ] ; then
cc_to=${cc_to:+${cc_to},}$address
elif [ "x$mode" = "xbcc" -o "x$mode" = "xBCC" ] ; then
bcc_to=${bcc_to:+${bcc_to},}$address
else
mailto=${mailto:+${mailto},}$address
fi
done </etc/ssh/notify
mailto=${mailto:-operator}
cc_to=${cc_to:+"-c $cc_to"}
bcc_to=${bcc_to:+"-b $bcc_to"}
mail ${cc_to} ${bcc_to} -s "SSH Alert" ${mailto} >&2 <<-EOM
${what} from ${where} at ${when}
EOM