Hi!

> Maybe there is a way to temporarily block ips upon such attempts (is
> this a FAQ?), or maybe divert them like what portsentry does for
> portscans?

A friend recommended 
  http://www.csc.liv.ac.uk/~greg/sshdfilter/
but I didn't try it myself. It runs as a daemon and blocks the IP if
several non-existant users have been tried. A logfile looks like this:

Jan 17 21:27:12 localhost sshd[14378]: Failed keyboard-interactive/pam for root 
from ::ffff:xx.xx.xx.xx port 53273 ssh2
Jan 17 21:27:12 localhost sshdfilt[14377]: Chanced xx.xx.xx.xx, tries=2
Jan 17 21:27:12 localhost sshd[14378]: Postponed keyboard-interactive for root 
from ::ffff:xx.xx.xx.xx port 53273 ssh2
Jan 17 21:27:16 localhost sshd[14378]: Connection closed by ::ffff:xx.xx.xx.xx
Jan 17 21:27:23 localhost sshdfilt[14377]: Illegal user name, instant block of 
xx.xx.xx.xx
Jan 17 21:27:23 localhost sshd[14378]: Illegal user admin from 
::ffff:xx.xx.xx.xx
Jan 17 21:27:23 localhost sshd[14378]: input_userauth_request: illegal user 
admin
Jan 17 21:27:23 localhost sshd[14378]: Failed none for illegal user admin from 
::ffff:xx.xx.xx.xx port 53289 ssh2

where xx.xx.xx.xx is the IP address of the offender.

Bye
  Hansi



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to