On Thu, 26 Aug 2004 01:55:55 +0200
Mezig <[EMAIL PROTECTED]> wrote:
> Nicolas Rueff wrote:
>
> >On Wed, 25 Aug 2004 17:35:36 +0200
> >Mezig <[EMAIL PROTECTED]> wrote:
> >
> >
> >
> >>1 id�e et sinon, je vous joint 1 info de chez K-Otik sur QT et surtout
> >>SSH :( !
> >>
> >>
> >
> >Ce qui explique pourquoi j'ai des tentatives de connexion sauvage sur ma
> >passerelle depuis quelques jours:
> >
> >Aug 24 17:57:13 firewall sshd[7654]: Failed password for test from
> >::ffff:67.18.247.2 port 44207 ssh2
> >Aug 24 17:57:15 firewall sshd[7656]: Failed password for guest from
> >::ffff:67.18.247.2 port 49327 ssh2
> >Aug 24 17:57:18 firewall sshd[7659]: Failed password for admin from
> >::ffff:67.18.247.2 port 39591 ssh2
> >Aug 24 17:57:20 firewall sshd[7661]: Failed password for admin from
> >::ffff:67.18.247.2 port 56204 ssh2
> >Aug 24 17:57:22 firewall sshd[7664]: Failed password for illegal user user
> >from ::ffff:67.18.247.2 port 33377 ssh2
> >Aug 24 17:57:25 firewall sshd[7666]: Failed password for root from
> >::ffff:67.18.247.2 port 60536 ssh2
> >Aug 24 17:57:27 firewall sshd[7669]: Failed password for root from
> >::ffff:67.18.247.2 port 41287 ssh2
> >Aug 24 17:57:29 firewall sshd[7671]: Failed password for root from
> >::ffff:67.18.247.2 port 54616 ssh2
> >Aug 24 17:57:32 firewall sshd[7674]: Failed password for test from
> >::ffff:67.18.247.2 port 60438 ssh2
> >
> >Lol ;)
> >
> >
> C 1 'avertissement' technique, mais ext�rieur � la communaut� linux :(!
> Par contre le PB peut devenir critique sous peu... , vu la quantit� de
> serveurs sous des OS Libre... :( !
>
> Sinon , d'apr�s spam-RBL, Adresse IP :
>
> 67.18.247.2 .... Cette IP n'est pas recens�e dans notre base ... :)!
bash-2.05b$ host 67.18.247.2
2.247.18.67.in-addr.arpa domain name pointer admin.sh3ll.ro.
> Tu n'as d�j� pas affaire � 1 spammeur... ; mais de l� � te rassurer ... ?
Pas de soucis pour moi: authentification via cl�s priv�es / publiques ;)
> Et sinon avec les options
>
> -B, --bogus-nxdomain=<ipaddr>
> Transform replies which contain the IP address given into
> "No such domain" replies. This is intended to counteract a devious move
> made by Versign
> in September 2003 when they started returning the address
> of an advertising web page in response to queries for unregistered
> names, instead of the
> correct NXDOMAIN response. This option tells dnsmasq
> to fake the correct response when it sees this behaviour. As at Sept
> 2003 the IP address
> being returnd by Verisign is 64.94.110.11
>
> -f, --filterwin2k
> Later versions of windows make periodic DNS requests which
> don't get sensible answers from the public DNS and can cause problems
> by triggering
> dial-on-demand links. This flag turns on an option to
> filter such requests. The requests blocked are for records of types SOA
> and SRV, and type
> ANY where the requested name has underscores, to catch
> LDAP requests.
>
> .... de dnsmask, il n'y a pas moyen de faire qque chose.... ?
C'est � dire ? Je ne comprends pas ce que tu veux dire.
> Note que vu mon niveau, c'est pas � toi que je risque 'd'apprendre'
> grand-chose ..., �a serai +t�t le contraire :( !
>
> Super ta page, j'y ai lu plein de sujets qui m'int�ressent... :) !
Yep, mais faudrait que je songe � la faire �voluer un poil (derni�re mise �
jour en mars dernier).
> Ajoute peut-�tre qque chose sur ssh et surtout les commandes 'avanc�es',
> si tu peux... :) ?
Honn�tement: pas le temps et surtout pas le net chez moi, ce qui complique
un chouia la mise � jour des trucs.
--
Nicolas Rueff � Montb�liard � France � http://rueff.homelinux.org
(^> [EMAIL PROTECTED] � GPG 0xDD44DAB4
/v\ Jabber [EMAIL PROTECTED] � ICQ 97700474
<__/ � We are Penguin. Resistance is futile. You will be assimilated. �