On 04.12.18 17:51, Michael Stauber wrote:
Hi Meaulnes,
# added 83.76.86.xxx on 12/04/18 12:09:33 with comment: dFixblock2
#83.76.86.xxx
It would be interesting to see why you got blocked in first place. The
logfile /var/log/secure or /var/log/messages has more info on that.

# less /var/log/secure | grep 83.76.86.xxx
Dec  3 13:37:41 vs sshd[2067]: Accepted password for root from 83.76.86.xxx 
port 64321 ssh2
Dec  3 14:29:59 vs sshd[2067]: Received disconnect from 83.76.86.xxx port 
64321:11: disconnected by user
Dec  3 14:29:59 vs sshd[2067]: Disconnected from 83.76.86.xxx port 64321
Dec  3 14:30:07 vs sshd[8076]: Accepted password for root from 83.76.86.xxx 
port 65345 ssh2
Dec  3 16:21:02 vs sshd[20793]: Accepted password for root from 83.76.86.xxx 
port 50320 ssh2
Dec 3 18:53:12 vs sshd[6062]: Connection closed by 83.76.86.xxx port 52402 
[preauth]
Dec  4 07:23:52 vs sshd[26926]: Accepted password for root from 83.76.86.xxx 
port 57483 ssh2
Dec  4 07:43:26 vs sshd[26926]: Received disconnect from 83.76.86.xxx port 
57483:11: disconnected by user
Dec  4 07:43:26 vs sshd[26926]: Disconnected from 83.76.86.xxx port 57483
Dec  4 07:47:37 vs sshd[28629]: Accepted password for root from 83.76.86.xxx 
port 57648 ssh2
Dec  4 08:11:56 vs sshd[28629]: Received disconnect from 83.76.86.xxx port 
57648:11: disconnected by user
Dec  4 08:11:56 vs sshd[28629]: Disconnected from 83.76.86.xxx port 57648
Dec  4 12:09:33 vs sshd[16055]: Failed password for root from 83.76.86.xxx port 
59640 ssh2
Dec  4 12:31:20 vs sshd[22456]: Accepted password for root from 83.76.86.xxx 
port 59828 ssh2
Dec  4 13:00:48 vs sshd[22456]: Received disconnect from 83.76.86.xxx port 
59828:11: disconnected by user
Dec  4 13:00:48 vs sshd[22456]: Disconnected from 83.76.86.xxx port 59828
Dec  4 15:56:40 vs sshd[11876]: Accepted password for root from 83.76.86.xxx 
port 61100 ssh2
Dec  4 17:49:28 vs sshd[21364]: Accepted password for root from 83.76.86.xxx 
port 49728 ssh2
Dec  4 19:52:24 vs sshd[21364]: Received disconnect from 83.76.86.xxx port 
49728:11: disconnected by user
Dec  4 19:52:24 vs sshd[21364]: Disconnected from 83.76.86.xxx port 49728

I don't see anything special except maybe the [preauth] line... Here the 
adjacent lines:

Dec  3 18:49:25 vs auth: pam_unix(dovecot:auth): authentication failure; 
logname= uid=0 euid=0 tty=dovecot ruser=gast rhost=89.248.162.159
Dec  3 18:52:59 vs sshd[29989]: Received disconnect from 94.103.my.ip port 
39294:11: disconnected by user
Dec  3 18:52:59 vs sshd[29989]: Disconnected from 94.103.my.ip port 39294
Dec  3 18:52:59 vs sshd[29989]: pam_unix(sshd:session): session closed for user 
root
Dec 3 18:53:12 vs sshd[6062]: Connection closed by 83.76.86.xxx port 52402 
[preauth]
Dec  3 18:54:10 vs auth: pam_unix(dovecot:auth): authentication failure; 
logname= uid=0 euid=0 tty=dovecot ruser=operator rhost=89.248.162.159  
user=operator

/var/log/messages looks pretty harmless:

# less /var/log/messages | grep 83.76.86.xxx
Dec  2 14:30:35 vs apf: apf(13325): {trust IPv4} allow all to/from 83.76.86.xxx
Dec  2 14:31:25 vs apf: apf(15388): {trust IPv4} allow all to/from 83.76.86.xxx
Dec  2 15:42:05 vs apf: apf(22135): {trust IPv4} allow all to/from 83.76.86.xxx
Dec  2 15:42:24 vs apf: apf(24164): {trust IPv4} allow all to/from 83.76.86.xxx
Dec  3 13:31:24 vs apf: apf(32208): {trust IPv4} allow all to/from 83.76.86.xxx
Dec  3 17:58:25 vs apf: apf(32315): {trust IPv4} allow all to/from 83.76.86.xxx
Dec  4 12:12:00 vs apf: apf(18790): {trust IPv4} allow all to/from 83.76.86.xxx
Dec  4 15:43:57 vs apf: apf(9099): {trust IPv4} allow all to/from 83.76.86.xxx

Other than that: Please consider uninstall Dfix2 and to switch to
Fail2ban, whose ruleset causes fewer false positives and detects more stuff.

will do.

Thank you Michael

_~_
'¿')
`-´      Meaulnes Legler

 Zurich, Switzerland

+41¦0 44 260 16 60


_______________________________________________
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx

Reply via email to