Re: [OpenIndiana-discuss] Support for LSI-2308 SAS controller in oi_151a8

2015-07-01 Thread Matt Boswell
Not sure I can return $8000 worth of drives, but if I have to, I will
certainly try.

M

On 7/1/15, 6:27 PM, "Jason Matthews"  wrote:

>
>Hp had a similar problem on their controllers. SSDs would invoke a
>thermal shut down.
>
>Return the drives for hgst counter parts.
>
>Sent from my iPhone
>
>> On Jul 1, 2015, at 5:16 PM, Matt Boswell 
>>wrote:
>> 
>> Hi all,
>> 
>> We bit the bullet and bought a companion storage server to use for ZFS
>>replication and failover. Our main box is about 3 years old and is also
>>running oi_151a8. We're running into some issues insisting that some of
>>the disks are over-temperature (via console messages), and now format
>>shows only 6 of the 26 disks installed in the system.  "fmadm faulty"
>>shows what I expected, that a slew of disks exceeded temperature
>>thresholds and have been marked as faulty.  I find this hard to believe,
>>as the system is properly cooled, in a colo rack, and the sensors on
>>board all show normal temperatures via IPMI.   FWIW these disks have
>>never been used; they are brand new and waiting to be added into zpools.
>> The controller BIOS shows all the disks as connected and healthy.  Just
>>wondering if anyone has run across this before and what can be done
>>about it.  The hardware is SuperMicro 6047R-E1R24L and the disks are WD
>>SAS 4TB drives, with two intel SSDs in the back for rpool and log devic
> 
> es.
>> Matt
>> ___
>> openindiana-discuss mailing list
>> openindiana-discuss@openindiana.org
>> http://openindiana.org/mailman/listinfo/openindiana-discuss
>> 
>
>___
>openindiana-discuss mailing list
>openindiana-discuss@openindiana.org
>http://openindiana.org/mailman/listinfo/openindiana-discuss


___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Support for LSI-2308 SAS controller in oi_151a8

2015-07-01 Thread Matt Boswell
Ouch. Thanks.  I¹ll do some research.

On a related note, we¹re using Constellations in our other build.  No
firmware problems, but we¹ve had lots of failures.  The difference is that
we¹re presenting them to OI as vdevs on the RAID controller rather than
JBOD.  Wonder if that might be a workaround; to create a bunch of single
disk RAID0 vdevs.

Matt

On 7/1/15, 6:11 PM, "Schweiss, Chip"  wrote:

>Sounds exactly like a firmware problem that Seagate Constellations had.
>With lsiutils you can read what threshold the disks report.
>
>You likely need a firmware upgrade or downgrade for the disks.
>
>-Chip
>
>
>On Wed, Jul 1, 2015 at 7:16 PM, Matt Boswell 
>wrote:
>
>> Hi all,
>>
>> We bit the bullet and bought a companion storage server to use for ZFS
>> replication and failover. Our main box is about 3 years old and is also
>> running oi_151a8. We're running into some issues insisting that some of
>>the
>> disks are over-temperature (via console messages), and now format shows
>> only 6 of the 26 disks installed in the system.  "fmadm faulty" shows
>>what
>> I expected, that a slew of disks exceeded temperature thresholds and
>>have
>> been marked as faulty.  I find this hard to believe, as the system is
>> properly cooled, in a colo rack, and the sensors on board all show
>>normal
>> temperatures via IPMI.   FWIW these disks have never been used; they are
>> brand new and waiting to be added into zpools.  The controller BIOS
>>shows
>> all the disks as connected and healthy.  Just wondering if anyone has
>>run
>> across this before and what can be done about it.  The hardware is
>> SuperMicro 6047R-E1R24L and the disks are WD SAS 4TB drives, with two
>>intel
>> SSDs in the back for rpool and log devices.
>> Matt
>> ___
>> openindiana-discuss mailing list
>> openindiana-discuss@openindiana.org
>> http://openindiana.org/mailman/listinfo/openindiana-discuss
>>
>___
>openindiana-discuss mailing list
>openindiana-discuss@openindiana.org
>http://openindiana.org/mailman/listinfo/openindiana-discuss


___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Support for LSI-2308 SAS controller in oi_151a8

2015-07-01 Thread Jason Matthews

Hp had a similar problem on their controllers. SSDs would invoke a thermal shut 
down. 

Return the drives for hgst counter parts. 

Sent from my iPhone

> On Jul 1, 2015, at 5:16 PM, Matt Boswell  wrote:
> 
> Hi all,
> 
> We bit the bullet and bought a companion storage server to use for ZFS 
> replication and failover. Our main box is about 3 years old and is also 
> running oi_151a8. We're running into some issues insisting that some of the 
> disks are over-temperature (via console messages), and now format shows only 
> 6 of the 26 disks installed in the system.  "fmadm faulty" shows what I 
> expected, that a slew of disks exceeded temperature thresholds and have been 
> marked as faulty.  I find this hard to believe, as the system is properly 
> cooled, in a colo rack, and the sensors on board all show normal temperatures 
> via IPMI.   FWIW these disks have never been used; they are brand new and 
> waiting to be added into zpools.  The controller BIOS shows all the disks as 
> connected and healthy.  Just wondering if anyone has run across this before 
> and what can be done about it.  The hardware is SuperMicro 6047R-E1R24L and 
> the disks are WD SAS 4TB drives, with two intel SSDs in the back for rpool 
> and log devices.
> Matt
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
> 

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Support for LSI-2308 SAS controller in oi_151a8

2015-07-01 Thread Schweiss, Chip
Sounds exactly like a firmware problem that Seagate Constellations had.
With lsiutils you can read what threshold the disks report.

You likely need a firmware upgrade or downgrade for the disks.

-Chip


On Wed, Jul 1, 2015 at 7:16 PM, Matt Boswell 
wrote:

> Hi all,
>
> We bit the bullet and bought a companion storage server to use for ZFS
> replication and failover. Our main box is about 3 years old and is also
> running oi_151a8. We're running into some issues insisting that some of the
> disks are over-temperature (via console messages), and now format shows
> only 6 of the 26 disks installed in the system.  "fmadm faulty" shows what
> I expected, that a slew of disks exceeded temperature thresholds and have
> been marked as faulty.  I find this hard to believe, as the system is
> properly cooled, in a colo rack, and the sensors on board all show normal
> temperatures via IPMI.   FWIW these disks have never been used; they are
> brand new and waiting to be added into zpools.  The controller BIOS shows
> all the disks as connected and healthy.  Just wondering if anyone has run
> across this before and what can be done about it.  The hardware is
> SuperMicro 6047R-E1R24L and the disks are WD SAS 4TB drives, with two intel
> SSDs in the back for rpool and log devices.
> Matt
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
>
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


[OpenIndiana-discuss] Support for LSI-2308 SAS controller in oi_151a8

2015-07-01 Thread Matt Boswell
Hi all,

We bit the bullet and bought a companion storage server to use for ZFS 
replication and failover. Our main box is about 3 years old and is also running 
oi_151a8. We're running into some issues insisting that some of the disks are 
over-temperature (via console messages), and now format shows only 6 of the 26 
disks installed in the system.  "fmadm faulty" shows what I expected, that a 
slew of disks exceeded temperature thresholds and have been marked as faulty.  
I find this hard to believe, as the system is properly cooled, in a colo rack, 
and the sensors on board all show normal temperatures via IPMI.   FWIW these 
disks have never been used; they are brand new and waiting to be added into 
zpools.  The controller BIOS shows all the disks as connected and healthy.  
Just wondering if anyone has run across this before and what can be done about 
it.  The hardware is SuperMicro 6047R-E1R24L and the disks are WD SAS 4TB 
drives, with two intel SSDs in the back for rpool and log devices.
Matt
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Who is trying to break in ?

2015-07-01 Thread Gary Gendel

With some investigation, it looks like SmartOS has a package for this:

http://everycity.co.uk/alasdair/2013/09/two-factor-authentication-google-authenticator-smartos/

Gary

On 07/01/2015 03:11 PM, Gary Gendel wrote:
Google Authenticator has a PAM module. I haven't tried it but I know 
it's available for several Linux distros.  I'm not sure how difficult 
it would be to port to OI.


http://www.tecmint.com/ssh-two-factor-authentication/

On 07/01/2015 02:53 PM, David Brodbeck wrote:

On Wed, Jul 1, 2015 at 3:15 AM, Jim Klimov  wrote:

You can also boost security with no passwords allowed, keys only for 
ssh

auth ;)


True.  I do this with machines where I'm the only one who'll be logging
in.  With machines that have lots of other users it becomes too much 
of an

administrative hassle to distribute keys.

Does anyone know of a 2-factor auth system for SSH?  Being able to use
something like Google Authenticator would be nice.




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss



___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Who is trying to break in ?

2015-07-01 Thread Gary Gendel
Google Authenticator has a PAM module. I haven't tried it but I know 
it's available for several Linux distros.  I'm not sure how difficult it 
would be to port to OI.


http://www.tecmint.com/ssh-two-factor-authentication/

On 07/01/2015 02:53 PM, David Brodbeck wrote:

On Wed, Jul 1, 2015 at 3:15 AM, Jim Klimov  wrote:


You can also boost security with no passwords allowed, keys only for ssh
auth ;)


True.  I do this with machines where I'm the only one who'll be logging
in.  With machines that have lots of other users it becomes too much of an
administrative hassle to distribute keys.

Does anyone know of a 2-factor auth system for SSH?  Being able to use
something like Google Authenticator would be nice.




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Who is trying to break in ?

2015-07-01 Thread David Brodbeck
On Wed, Jul 1, 2015 at 3:15 AM, Jim Klimov  wrote:

> You can also boost security with no passwords allowed, keys only for ssh
> auth ;)
>

True.  I do this with machines where I'm the only one who'll be logging
in.  With machines that have lots of other users it becomes too much of an
administrative hassle to distribute keys.

Does anyone know of a 2-factor auth system for SSH?  Being able to use
something like Google Authenticator would be nice.

-- 
D. Brodbeck
System Administrator, Linguistics
University of Washington
GPG key fingerprint: 0DB7 4B50 8910 DBC5 B510 79C4 3970 2BC3 2078 D875
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] [OmniOS-discuss] pkg(5) in alternate roots

2015-07-01 Thread Jim Klimov
1 июля 2015 г. 15:20:56 CEST, Jim Klimov  пишет:
>Hello all,
>
>
>Due to my split-root configurations, I often do OI/OmniOS upgrades in a
>pre-created cloned BE (automated by
>https://github.com/jimklimov/illumos-splitroot-scripts since the
>generic beadm/zfs clone do a poor job with customized zfs attributes on
>child datasets). As part of an upgrade, I do a chroot into the mounted
>new BE to use the pkg(5) "in place" (and with altroot of "/") and if
>this fails - I fall back to alternate root (-R) with the unchanged
>pkg(5) version installed in the original BE. In either case, I pass the
>"--deny-new-be" parameter to pkg(5). (relevant code snippet is
>presented below in this message)
>
>
>However there are some packages whose upgrades seem to require a
>"non-Live BE" installation. And even though I install to an alternate
>BE, they fail. Is there some way around this, beside fixing pkg(5)
>itself?
>
>
>For example, recently I got the state below: the pkg program got
>updated in the new BE, but it could not be used via chroot due to "live
>image" concerns, and the old pkg(5) in original BE did not suffice for
>the upgrades. A reboot into the new BE and another upgrade request
>fixes this, but that's kind of unwieldy. And installing new pkg into
>old BE goes somewhat against the purpose of BEs (unchanged old state I
>can roll back into - thus including escape from broken pkg(5) as any
>other bit of system software).
>
>
>Screenshot from the script:
>
>
>
>= Updating PKG software itself
>Packages to update: 1
>
>
>DOWNLOAD                                PKGS         FILES    XFER (MB)
>  SPEED
>Completed                                1/1         16/16      0.3/0.3
> 303k/s
>
>
>PHASE                                          ITEMS
>Removing old actions                             1/1
>Updating modified actions                      18/18
>Updating package state database                 Done
>Updating package cache                           1/1
>Updating image state                            Done
>Creating fast lookup database                   Done
>Reading search index                            Done
>Updating search index                            1/1
>
>
>
>= Updating the image with new PKG software via chroot
>pkg update: The proposed operation cannot be performed on a live image.
>= Updating the image with old PKG software via altroot
>WARNING: pkg(5) appears to be out of date, and should be updated before
>running update.  Please update pkg(5) by executing 'pkg install
>pkg:/package/pkg' as a privileged user and then retry the update.
>= Updating the image with old PKG software via altroot and allowed
>refresh
>WARNING: pkg(5) appears to be out of date, and should be updated before
>running update.  Please update pkg(5) by executing 'pkg install
>pkg:/package/pkg' as a privileged user and then retry the update.
>
>
>
>
>The corresponding part of the script (and exact command-lines involved)
>are here:
>
>
>...
>
>        { echo "= Updating PKG software itself"
>          ### This clause should fail if no 'pkg' updates were
>available, or if a
>          ### chrooted upgrade attempt with the new 'pkg' failed - both
>ways fall
>          ### through to altroot upgrade attempt
>          if /usr/bin/pkg -R "$BENEW_MNT" update --no-refresh --accept
>--deny-new-be --no-backup-be pkg; then \
>            echo "= Updating the image with new PKG software via
>chroot"
>            chroot "$BENEW_MNT" /usr/bin/pkg -R / image-update
>--no-refresh --accept --deny-new-be --no-backup-be
>          else false; fi; } || \
>        { echo "= Updating the image with old PKG software via
>altroot"
>          /usr/bin/pkg -R "$BENEW_MNT" image-update --no-refresh
>--accept --deny-new-be --no-backup-be; } || \
>        { echo "= Updating the image with old PKG software via
>altroot and allowed refresh"
>          /usr/bin/pkg -R "$BENEW_MNT" image-update --accept
>--deny-new-be --no-backup-be; }
>...
>
>
>
>
>Essentially, what I want is for pkg(5) to correctly guess, or be told
>by the caller, that it in fact does not modify a "live" image and so
>can do anything dangerous it would please to do.
>
>
>Thanks in advance,
>Jim Klimov
>
>
>
>
>
>
>
>
>___
>OmniOS-discuss mailing list
>omnios-disc...@lists.omniti.com
>http://lists.omniti.com/mailman/listinfo/omnios-discuss

I guess i found the workaround - the pkg(5) script honors some PKG_LIVE_ROOT 
variable, for unittesting from what i gather, that along with -R allows to not 
create BEs for packages that otherwise need them.

I guess this is not a committed api, but will have to do ;)

Jim
--
Typos courtesy of K-9 Mail on my Samsung Android

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] how to trace what stops the daemon from sleeping?

2015-07-01 Thread WarGrey Gyoudmon Ju
Now the problem is solved.
I rebuilt Racket without defining HAVE_POLL_SYSCALL.
So it is running with select(), and pollsys() is still on the top of stack.

The LD_PRELOAD way fails as before.

Thanks.

On Wed, Jul 1, 2015 at 6:37 AM, Bob Friesenhahn <
bfrie...@simple.dallas.tx.us> wrote:

> On Tue, 30 Jun 2015, WarGrey Gyoudmon Ju wrote:
>
>  Thank you, Bob.
>>
>> Finally I found the root cause is that pollsys is called too frequently.
>> and this problem seems quite normal in Solaris family.
>>
>
> I am pretty sure that this has nothing to do with power management (as
> other have suggested).
>
> The poll() call can wait for activities on file descriptors but can also
> be used for time-out such as for periodic event loops.  Some software is
> written poorly and executes periodic event loops quite often.
>
> If you don't have source for the program, it might be possible to "fix" it
> by using the LD_PRELOAD enviroment variable and a tiny shared library which
> replaces poll() with one which insists on longer timeouts.  This might
> cause other problems to occur in the software though.
>
>
> Bob
> --
> Bob Friesenhahn
> bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
> GraphicsMagick Maintainer,http://www.GraphicsMagick.org/
>
> ___
> openindiana-discuss mailing list
> openindiana-discuss@openindiana.org
> http://openindiana.org/mailman/listinfo/openindiana-discuss
>
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Who is trying to break in ?

2015-07-01 Thread Bob Friesenhahn

On Wed, 1 Jul 2015, Jim Klimov wrote:


You can also boost security with no passwords allowed, keys only for ssh auth ;)


This certainly helps, but a remote compromised machine could still use 
those keys to log in to your system.  Hopefully users of those keys do 
apply a passphrase to them.  If the remote machine is compromised, 
then the key passphrase could be captured by keystroke logging and the 
private key file could be copied at that time.


Bob
--
Bob Friesenhahn
bfrie...@simple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,http://www.GraphicsMagick.org/

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


[OpenIndiana-discuss] pkg(5) in alternate roots

2015-07-01 Thread Jim Klimov
Hello all,


Due to my split-root configurations, I often do OI/OmniOS upgrades in a 
pre-created cloned BE (automated by 
https://github.com/jimklimov/illumos-splitroot-scripts since the generic 
beadm/zfs clone do a poor job with customized zfs attributes on child 
datasets). As part of an upgrade, I do a chroot into the mounted new BE to use 
the pkg(5) "in place" (and with altroot of "/") and if this fails - I fall back 
to alternate root (-R) with the unchanged pkg(5) version installed in the 
original BE. In either case, I pass the "--deny-new-be" parameter to pkg(5). 
(relevant code snippet is presented below in this message)


However there are some packages whose upgrades seem to require a "non-Live BE" 
installation. And even though I install to an alternate BE, they fail. Is there 
some way around this, beside fixing pkg(5) itself?


For example, recently I got the state below: the pkg program got updated in the 
new BE, but it could not be used via chroot due to "live image" concerns, and 
the old pkg(5) in original BE did not suffice for the upgrades. A reboot into 
the new BE and another upgrade request fixes this, but that's kind of unwieldy. 
And installing new pkg into old BE goes somewhat against the purpose of BEs 
(unchanged old state I can roll back into - thus including escape from broken 
pkg(5) as any other bit of system software).


Screenshot from the script:



= Updating PKG software itself
Packages to update: 1


DOWNLOAD                                PKGS         FILES    XFER (MB)   SPEED
Completed                                1/1         16/16      0.3/0.3  303k/s


PHASE                                          ITEMS
Removing old actions                             1/1
Updating modified actions                      18/18
Updating package state database                 Done
Updating package cache                           1/1
Updating image state                            Done
Creating fast lookup database                   Done
Reading search index                            Done
Updating search index                            1/1



= Updating the image with new PKG software via chroot
pkg update: The proposed operation cannot be performed on a live image.
= Updating the image with old PKG software via altroot
WARNING: pkg(5) appears to be out of date, and should be updated before
running update.  Please update pkg(5) by executing 'pkg install
pkg:/package/pkg' as a privileged user and then retry the update.
= Updating the image with old PKG software via altroot and allowed refresh
WARNING: pkg(5) appears to be out of date, and should be updated before
running update.  Please update pkg(5) by executing 'pkg install
pkg:/package/pkg' as a privileged user and then retry the update.




The corresponding part of the script (and exact command-lines involved) are 
here:


...

        { echo "= Updating PKG software itself"
          ### This clause should fail if no 'pkg' updates were available, or if 
a
          ### chrooted upgrade attempt with the new 'pkg' failed - both ways 
fall
          ### through to altroot upgrade attempt
          if /usr/bin/pkg -R "$BENEW_MNT" update --no-refresh --accept 
--deny-new-be --no-backup-be pkg; then \
            echo "= Updating the image with new PKG software via chroot"
            chroot "$BENEW_MNT" /usr/bin/pkg -R / image-update --no-refresh 
--accept --deny-new-be --no-backup-be
          else false; fi; } || \
        { echo "= Updating the image with old PKG software via altroot"
          /usr/bin/pkg -R "$BENEW_MNT" image-update --no-refresh --accept 
--deny-new-be --no-backup-be; } || \
        { echo "= Updating the image with old PKG software via altroot and 
allowed refresh"
          /usr/bin/pkg -R "$BENEW_MNT" image-update --accept --deny-new-be 
--no-backup-be; }
...




Essentially, what I want is for pkg(5) to correctly guess, or be told by the 
caller, that it in fact does not modify a "live" image and so can do anything 
dangerous it would please to do.


Thanks in advance,
Jim Klimov




___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Who is trying to break in ?

2015-07-01 Thread Jim Klimov
1 июля 2015 г. 9:51:49 CEST, benta...@chez.com пишет:
>Hi, 
>I've been using sshl to multiplex openvpn, https and ssh on port 443 to
>be able to go through anything and before that I was using tcpproxy for
>the same reason.
>I'm pretty impressed by sshl and I hope to use it when I replace the
>linux all-in-one box by an refurbished Ultra 20/hipster.
>
>To be honest, for a very long time I had port 22 opened as well for ssh
>the time to trust sshl and the difference is quite noticeable, security
>wise.
>On the other hand, if you don't allow root login, have good passwords
>for users and root and log rotation correctly set, port 22 or not is
>just a convenience question but I'm not a security guy, really.
>
>Ben.
>
>- Mail original -
>De: "Jim Klimov" 
>À: "Discussion list for OpenIndiana"
>, "Till Wegmüller"
>
>Envoyé: Lundi 29 Juin 2015 21:02:44
>Objet: Re: [OpenIndiana-discuss] Who is trying to break in ?
>
>29 июня 2015 г. 9:37:26 CEST, "Till Wegmüller" 
>пишет:
>>Brogyányi József schrieb am Sunday 28 June 2015 11.01:55:
>>
>>> /The last was strange a little bit because he wanted to switch of
>the
>>
>>> server. I think you have to change the 21 and 22 communication port.
>>> I use the 443 port for ssh. I can reach the server easily from
>>anywhere 
>>> because every company left it open that port.
>>
>>I Advise Strongly against using a different port for SSH. Especially a
>>port like 443 which by default is used by apache and other webservers.
>>Some Webservers might refuse to launch depending on their
>>configuration.
>>
>>> I've noticed some text output before shutting down the system.
>>> It seems someone ( or bots ) are constantly trying to log in as
>root.
>>
>>Yea there are some Chinese Bot nets that scan for open SSH Ports and
>>try to log in with root. I have them on every SSH capable server which
>>is Internet reachable. They don't only scan 22 but also 666 or 1337.
>>But they only make tries with weak default passwords like 12345. 
>>
>>If you want to block them I suggest the Tool fail2ban. I use it on my
>>Linux boxes and it works like a charm. There also seems to be a Port
>>for snv_134 https://github.com/jamesstout/fail2ban-0.8.4-OpenSolaris
>>but I haven't tested that.
>>
>>Greetings Till
>>
>>___
>>openindiana-discuss mailing list
>>openindiana-discuss@openindiana.org
>>http://openindiana.org/mailman/listinfo/openindiana-discuss
>
>Got no qualms about ssh (or openvpn) on port 443 - indeed, if one sets
>up something non-standard, gotta be ready for the consequences. And to
>all ids'es and sniffers, cryptotraffic looks much the same (different
>dynamic flow patterns may be discerned by the smarter filters out there
>though).
>
>As was said earlier, many networks (especially free wifi, and some
>cellulars) only allow http(s) outwards, so there's not much choice for
>road-workers.
>
>Also, there are server-side projects to colocate frontends for https
>and ssh or openvpn on the same socket to veil it even more.
>
>
>--
>Typos courtesy of K-9 Mail on my Samsung Android
>
>___
>openindiana-discuss mailing list
>openindiana-discuss@openindiana.org
>http://openindiana.org/mailman/listinfo/openindiana-discuss
>
>___
>openindiana-discuss mailing list
>openindiana-discuss@openindiana.org
>http://openindiana.org/mailman/listinfo/openindiana-discuss

You can also boost security with no passwords allowed, keys only for ssh auth ;)
--
Typos courtesy of K-9 Mail on my Samsung Android

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss


Re: [OpenIndiana-discuss] Who is trying to break in ?

2015-07-01 Thread bentahyr
Hi, 
I've been using sshl to multiplex openvpn, https and ssh on port 443 to be able 
to go through anything and before that I was using tcpproxy for the same reason.
I'm pretty impressed by sshl and I hope to use it when I replace the linux 
all-in-one box by an refurbished Ultra 20/hipster.

To be honest, for a very long time I had port 22 opened as well for ssh the 
time to trust sshl and the difference is quite noticeable, security wise.
On the other hand, if you don't allow root login, have good passwords for users 
and root and log rotation correctly set, port 22 or not is just a convenience 
question but I'm not a security guy, really.

Ben.

- Mail original -
De: "Jim Klimov" 
À: "Discussion list for OpenIndiana" , 
"Till Wegmüller" 
Envoyé: Lundi 29 Juin 2015 21:02:44
Objet: Re: [OpenIndiana-discuss] Who is trying to break in ?

29 июня 2015 г. 9:37:26 CEST, "Till Wegmüller"  пишет:
>Brogyányi József schrieb am Sunday 28 June 2015 11.01:55:
>
>> /The last was strange a little bit because he wanted to switch of the
>
>> server. I think you have to change the 21 and 22 communication port.
>> I use the 443 port for ssh. I can reach the server easily from
>anywhere 
>> because every company left it open that port.
>
>I Advise Strongly against using a different port for SSH. Especially a
>port like 443 which by default is used by apache and other webservers.
>Some Webservers might refuse to launch depending on their
>configuration.
>
>> I've noticed some text output before shutting down the system.
>> It seems someone ( or bots ) are constantly trying to log in as root.
>
>Yea there are some Chinese Bot nets that scan for open SSH Ports and
>try to log in with root. I have them on every SSH capable server which
>is Internet reachable. They don't only scan 22 but also 666 or 1337.
>But they only make tries with weak default passwords like 12345. 
>
>If you want to block them I suggest the Tool fail2ban. I use it on my
>Linux boxes and it works like a charm. There also seems to be a Port
>for snv_134 https://github.com/jamesstout/fail2ban-0.8.4-OpenSolaris
>but I haven't tested that.
>
>Greetings Till
>
>___
>openindiana-discuss mailing list
>openindiana-discuss@openindiana.org
>http://openindiana.org/mailman/listinfo/openindiana-discuss

Got no qualms about ssh (or openvpn) on port 443 - indeed, if one sets up 
something non-standard, gotta be ready for the consequences. And to all ids'es 
and sniffers, cryptotraffic looks much the same (different dynamic flow 
patterns may be discerned by the smarter filters out there though).

As was said earlier, many networks (especially free wifi, and some cellulars) 
only allow http(s) outwards, so there's not much choice for road-workers.

Also, there are server-side projects to colocate frontends for https and ssh or 
openvpn on the same socket to veil it even more.


--
Typos courtesy of K-9 Mail on my Samsung Android

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss

___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
http://openindiana.org/mailman/listinfo/openindiana-discuss