Re: [OpenIndiana-discuss] Who is trying to break in ?

2015-06-29 Thread Gary Gendel
I use fail2ban on my OpenIndiana machine.  I opted to compile it because 
the one around for OI are pretty old.   There were no issues.  If I 
remember, I did use the svc files from one of these packages but I might 
have whipped up my own. I also moved my ssh port to 222 just because of 
the frequency ssh was getting hit.  I rarely see an attempt to connect 
from a bot.


Gary

On 6/29/2015 3:37 AM, Till Wegmüller wrote:

Brogyányi József schrieb am Sunday 28 June 2015 11.01:55:


/The last was strange a little bit because he wanted to switch of the
server. I think you have to change the 21 and 22 communication port.
I use the 443 port for ssh. I can reach the server easily from anywhere
because every company left it open that port.

I Advise Strongly against using a different port for SSH. Especially a port 
like 443 which by default is used by apache and other webservers. Some 
Webservers might refuse to launch depending on their configuration.


I've noticed some text output before shutting down the system.
It seems someone ( or bots ) are constantly trying to log in as root.

Yea there are some Chinese Bot nets that scan for open SSH Ports and try to log 
in with root. I have them on every SSH capable server which is Internet 
reachable. They don't only scan 22 but also 666 or 1337. But they only make 
tries with weak default passwords like 12345.

If you want to block them I suggest the Tool fail2ban. I use it on my Linux 
boxes and it works like a charm. There also seems to be a Port for snv_134 
https://github.com/jamesstout/fail2ban-0.8.4-OpenSolaris but I haven't tested 
that.

Greetings Till

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Who is trying to break in ?

2015-06-29 Thread Till Wegmüller
Brogyányi József schrieb am Sunday 28 June 2015 11.01:55:

 /The last was strange a little bit because he wanted to switch of the 
 server. I think you have to change the 21 and 22 communication port.
 I use the 443 port for ssh. I can reach the server easily from anywhere 
 because every company left it open that port.

I Advise Strongly against using a different port for SSH. Especially a port 
like 443 which by default is used by apache and other webservers. Some 
Webservers might refuse to launch depending on their configuration.

 I've noticed some text output before shutting down the system.
 It seems someone ( or bots ) are constantly trying to log in as root.

Yea there are some Chinese Bot nets that scan for open SSH Ports and try to log 
in with root. I have them on every SSH capable server which is Internet 
reachable. They don't only scan 22 but also 666 or 1337. But they only make 
tries with weak default passwords like 12345. 

If you want to block them I suggest the Tool fail2ban. I use it on my Linux 
boxes and it works like a charm. There also seems to be a Port for snv_134 
https://github.com/jamesstout/fail2ban-0.8.4-OpenSolaris but I haven't tested 
that.

Greetings Till

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Who is trying to break in ?

2015-06-29 Thread Jim Klimov
29 июня 2015 г. 9:37:26 CEST, Till Wegmüller toaster...@gmail.com пишет:
Brogyányi József schrieb am Sunday 28 June 2015 11.01:55:

 /The last was strange a little bit because he wanted to switch of the

 server. I think you have to change the 21 and 22 communication port.
 I use the 443 port for ssh. I can reach the server easily from
anywhere 
 because every company left it open that port.

I Advise Strongly against using a different port for SSH. Especially a
port like 443 which by default is used by apache and other webservers.
Some Webservers might refuse to launch depending on their
configuration.

 I've noticed some text output before shutting down the system.
 It seems someone ( or bots ) are constantly trying to log in as root.

Yea there are some Chinese Bot nets that scan for open SSH Ports and
try to log in with root. I have them on every SSH capable server which
is Internet reachable. They don't only scan 22 but also 666 or 1337.
But they only make tries with weak default passwords like 12345. 

If you want to block them I suggest the Tool fail2ban. I use it on my
Linux boxes and it works like a charm. There also seems to be a Port
for snv_134 https://github.com/jamesstout/fail2ban-0.8.4-OpenSolaris
but I haven't tested that.

Greetings Till

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss

Got no qualms about ssh (or openvpn) on port 443 - indeed, if one sets up 
something non-standard, gotta be ready for the consequences. And to all ids'es 
and sniffers, cryptotraffic looks much the same (different dynamic flow 
patterns may be discerned by the smarter filters out there though).

As was said earlier, many networks (especially free wifi, and some cellulars) 
only allow http(s) outwards, so there's not much choice for road-workers.

Also, there are server-side projects to colocate frontends for https and ssh or 
openvpn on the same socket to veil it even more.


--
Typos courtesy of K-9 Mail on my Samsung Android

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss