Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Nov 1999 17:45:08 -0800 (PST)
From:      mike@sentex.net
To:        freebsd-gnats-submit@freebsd.org
Subject:   ports/14933: Simple patch to log password attempts on ssh connections
Message-ID:  <19991117014508.718E814FB4@hub.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         14933
>Category:       ports
>Synopsis:       Simple patch to log password attempts on ssh connections
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Tue Nov 16 17:50:01 PST 1999
>Closed-Date:
>Last-Modified:
>Originator:     Mike Tancsa
>Release:        FreeBSD
>Organization:
Sentex Communications
>Environment:
FreeBSD 3.3-STABLE #0: Mon Nov  8 09:15:21 EST 1999
>Description:
The following patch will log to syslog password attempts when connecting via SSH.  Currently, an attacker can guess all they want, with out any real auditing.
>How-To-Repeat:
slogin example.com
>Fix:
*** sshd.c.orig2        Tue Nov 16 13:59:12 1999
--- work/ssh-1.2.27/sshd.c      Tue Nov 16 13:59:48 1999
***************
*** 2673,2678 ****
--- 2673,2679 ----
                break;
              }
            debug("Password authentication for %.100s failed.", user);
+           log_msg("Password LOGIN FAILURE for user: %.100s from: %.100s", user,get_canonical_hostname());
            memset(password, 0, strlen(password));
            xfree(password);
            break;

>Release-Note:
>Audit-Trail:
>Unformatted:


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19991117014508.718E814FB4>