Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 26 Apr 2005 11:42:07 +0100
From:      Daniel Bye <freebsd-questions@slightlystrange.org>
To:        freebsd-questions@freebsd.org
Subject:   Re: illegal user root user failed login attempts
Message-ID:  <20050426104206.GA53044@catflap.slightlystrange.org>
In-Reply-To: <ec0b1e25b6de0216c5744ed8d40d560c@zen.co.uk>
References:  <ec0b1e25b6de0216c5744ed8d40d560c@zen.co.uk>

next in thread | previous in thread | raw e-mail | index | archive | help

--2oS5YaxWCcQjTEyO
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Tue, Apr 26, 2005 at 09:22:34AM +0100, Peter Kropholler wrote:
> I run a server at home on port 22.
> There are loads of illegal user attempts to login
> every few days. As its at home I protect myself
> by having only one user on the sshd AllowUsers
> list and with a very strong password and no
> admin/sysman priveleges.

Good strategy.  You could even go so far as to deny logins without a
public key.

> So essentially every failed login attempt is illegal.
>=20
> Is there any way to actually record what passwords
> the hackers' scripts are trying? I am just really intrigued
> to know what they are thinking might work.

No - ssh transport is encrypted even by the time passwords are involved.

> I realize that it's not normally appropriate to log people's
> passwords but in my case I am literally the only user
> who will ever legitimately login to my machine

It'll just be a script running somewhere that offers common passwords,
random words, etc.  You'd be amazed at how many installations use a
default password (Cliff Stoll's The Cuckoo's Egg is a damn fine read,
and talks about default passwords on admin and field service accounts)

More useful might be to log the IP addresses the connections are coming
from and report the abuse to the authority to whom the addresses are
assigned.  You never know - they might feel compelled to stamp on the
little buggers...

Dan

--=20
Daniel Bye

PGP Key: ftp://ftp.slightlystrange.org/pgpkey/dan.asc
PGP Key fingerprint: 3B9D 8BBB EB03 BA83 5DB4 3B88 86FC F03A 90A1 BE8F
                                                                     _
                                              ASCII ribbon campaign ( )
                                         - against HTML, vCards and  X
                                - proprietary attachments in e-mail / \

--2oS5YaxWCcQjTEyO
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (FreeBSD)

iD8DBQFCbhr8hvzwOpChvo8RAthZAKCMFR9kK3OTFdGsJ61pNH3x1B2M7wCfYG84
9/92mpu0aCrN5duSrwqm8Zs=
=wDK+
-----END PGP SIGNATURE-----

--2oS5YaxWCcQjTEyO--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050426104206.GA53044>