[The is a security configuration question. Let me try it here to see if I
can some valuable inputs before heading to newsgroup]

Hi,

I used to turn on my sshd just in case that I need to ssh back into my
box. But recently, I noticed that whenever I turn it on, almost instantly,
there will be a cracker attempting cracking into my sshd:

 $ tail -15 /var/log/auth.log
 Oct  6 10:52:05 cxmr sshd[7374]: Invalid user deutch from 220.229.57.152
 Oct  6 10:52:05 cxmr sshd[7374]: Address 220.229.57.152 maps to 
adsl-220-229-57-152.kh.sparqnet.net, but this does not map back to the address 
- POSSIBLE BREAK-IN ATTEMPT!
 Oct  6 10:52:05 cxmr sshd[7374]: (pam_unix) check pass; user unknown
 Oct  6 10:52:05 cxmr sshd[7374]: (pam_unix) authentication failure; logname= 
uid=0 euid=0 tty=ssh ruser= rhost=220.229.57.152 
 Oct  6 10:52:07 cxmr sshd[7374]: Failed password for invalid user deutch from 
220.229.57.152 port 46369 ssh2
 Oct  6 10:52:10 cxmr sshd[7379]: Invalid user german from 220.229.57.152
 Oct  6 10:52:10 cxmr sshd[7379]: Address 220.229.57.152 maps to 
adsl-220-229-57-152.kh.sparqnet.net, but this does not map back to the address 
- POSSIBLE BREAK-IN ATTEMPT!
 Oct  6 10:52:10 cxmr sshd[7379]: (pam_unix) check pass; user unknown
 Oct  6 10:52:10 cxmr sshd[7379]: (pam_unix) authentication failure; logname= 
uid=0 euid=0 tty=ssh ruser= rhost=220.229.57.152 
 Oct  6 10:52:12 cxmr sshd[7379]: Failed password for invalid user german from 
220.229.57.152 port 46536 ssh2
 Oct  6 10:52:20 cxmr sshd[7384]: Invalid user hitler from 220.229.57.152
 Oct  6 10:52:20 cxmr sshd[7384]: Address 220.229.57.152 maps to 
adsl-220-229-57-152.kh.sparqnet.net, but this does not map back to the address 
- POSSIBLE BREAK-IN ATTEMPT!
 Oct  6 10:52:20 cxmr sshd[7384]: (pam_unix) check pass; user unknown
 Oct  6 10:52:20 cxmr sshd[7384]: (pam_unix) authentication failure; logname= 
uid=0 euid=0 tty=ssh ruser= rhost=220.229.57.152 
 Oct  6 10:52:22 cxmr sshd[7384]: Failed password for invalid user hitler from 
220.229.57.152 port 46858 ssh2

What's your recommendation to such situation? 

PS.

1. I used to track down their ISP and complain about the cracking attempts,
but nobody seems to be listening to me, and there has never been any
responses.

2. I think the (default Debian) sshd configuration should be changed. Even
when someone attempts cracking by typing in user names and passwords
manually in front of tty will be penalized. But I've notice my sshd joyfully
allows thousands of cracking attempts within minutes. This is rather silly,
or incompetent.

Please comment.

thanks


-- 
Tong (remove underscore(s) to reply)
  http://xpt.sourceforge.net/techdocs/
  http://xpt.sourceforge.net/tools/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to