From owner-freebsd-questions@FreeBSD.ORG Tue Apr 26 10:45:55 2005 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id A563A16A4CE for ; Tue, 26 Apr 2005 10:45:55 +0000 (GMT) Received: from zproxy.gmail.com (zproxy.gmail.com [64.233.162.199]) by mx1.FreeBSD.org (Postfix) with ESMTP id 5263743D39 for ; Tue, 26 Apr 2005 10:45:55 +0000 (GMT) (envelope-from j65nko@gmail.com) Received: by zproxy.gmail.com with SMTP id 40so1882256nzk for ; Tue, 26 Apr 2005 03:45:54 -0700 (PDT) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=C2rnGt3YCKNi2wDfVkoewnAF4M5ChfqpIZjOpQ4aVC/oZfVfAtzdyyzb5AHt+NIERs67TrWkQVzTFDRgqcGTBGJTs8DSNfoQeCx6tJhdaG4L6TUfbRUCUo4xz/nLWD/Fi7Ot091Lh0tf6zSwrntq9K3MY4WSwXcUke890CVgrPU= Received: by 10.36.108.14 with SMTP id g14mr587680nzc; Tue, 26 Apr 2005 03:45:54 -0700 (PDT) Received: by 10.36.42.10 with HTTP; Tue, 26 Apr 2005 03:45:54 -0700 (PDT) Message-ID: <19861fba05042603456626a817@mail.gmail.com> Date: Tue, 26 Apr 2005 12:45:54 +0200 From: J65nko BSD To: Peter Kropholler In-Reply-To: Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline References: cc: freebsd-questions@freebsd.org Subject: Re: illegal user root user failed login attempts X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: J65nko BSD List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Apr 2005 10:45:55 -0000 On 4/26/05, Peter Kropholler wrote: > I run a server at home on port 22. > There are loads of illegal user attempts to login > every few days. As its at home I protect myself > by having only one user on the sshd AllowUsers > list and with a very strong password and no > admin/sysman priveleges. >=20 > So essentially every failed login attempt is illegal. >=20 > Is there any way to actually record what passwords > the hackers' scripts are trying? I am just really intrigued > to know what they are thinking might work. >=20 > I realize that it's not normally appropriate to log people's > passwords but in my case I am literally the only user > who will ever legitimately login to my machine > ______________________________ Moving your ssh port away from port 22 seems to stop these attempts. These logons seem to come from cracked Linux boxes. This issue has been discussed quite a lot on this list. For a non-list discussion, see http://www.freebsdforums.org/forums/showthread.php?s=3D&threadid=3D27683 =3DAdriaan=3D