Hallo Liste,

 gibt es eine M�glichkeit mich gegen Brute Force Attacken via ssh durch
 beschr�nkte maximale Connections o.�. zu sch�tzen?
 Bzw. wie kann ich mich noch sch�tzen.

 In meiner auth.log des servers sind folgende Zeilen enthalten. Die
 Eintr�ge sind ein kurzer Auszug von einem ca. 30 min Angriff:

--------------------------------------------------
[...] (beginn Jan 30 04:28:04)
Jan 30 05:00:08 server sshd[8117]: Connection from 66.79.165.130 port 42857
Jan 30 05:00:08 server sshd[8117]: Enabling compatibility mode for protocol 2.0
Jan 30 05:00:09 server sshd[8117]: User root not allowed because none of user's 
groups are listed in AllowGroups
Jan 30 05:00:09 server sshd[8130]: Connection from 66.79.165.130 port 42907
Jan 30 05:00:09 server sshd[8130]: Enabling compatibility mode for protocol 2.0
Jan 30 05:00:11 server sshd[8130]: User root not allowed because none of user's 
groups are listed in AllowGroups
Jan 30 05:00:11 server sshd[8137]: Connection from 66.79.165.130 port 42944
Jan 30 05:00:11 server sshd[8137]: Enabling compatibility mode for protocol 2.0
Jan 30 05:00:12 server sshd[8137]: User root not allowed because none of user's 
groups are listed in AllowGroups
Jan 30 05:00:12 server sshd[8147]: Connection from 66.79.165.130 port 43006
Jan 30 05:00:13 server sshd[8147]: Enabling compatibility mode for protocol 2.0
Jan 30 05:00:14 server sshd[8147]: User root not allowed because none of user's 
groups are listed in AllowGroups
Jan 30 05:00:14 server sshd[8158]: Connection from 66.79.165.130 port 43047
Jan 30 05:00:14 server sshd[8158]: Enabling compatibility mode for protocol 2.0
Jan 30 05:00:15 server sshd[8158]: User root not allowed because none of user's 
groups are listed in AllowGroups
Jan 30 05:00:15 server sshd[8160]: Connection from 66.79.165.130 port 43081
Jan 30 05:00:16 server sshd[8160]: Enabling compatibility mode for protocol 2.0
Jan 30 05:00:16 server sshd[8160]: User root not allowed because none of user's 
groups are listed in AllowGroups
Jan 30 05:00:17 server sshd[8174]: Connection from 66.79.165.130 port 43135
Jan 30 05:00:17 server sshd[8174]: Enabling compatibility mode for protocol 2.0
Jan 30 05:00:18 server sshd[8174]: User root not allowed because none of user's 
groups are listed in AllowGroups
Jan 30 05:00:18 server sshd[8180]: Connection from 66.79.165.130 port 43171
Jan 30 05:00:18 server sshd[8180]: Enabling compatibility mode for protocol 2.0
Jan 30 05:00:19 server sshd[8180]: User root not allowed because none of user's 
groups are listed in AllowGroups
--------------------------------------------------

 Kann ich das in gewisser Weise unterbinden? Was sollte alles in einer
 sshd_config drin stehen?

 Macht es Sinn sich bei solchen Angriffen an die Abuse-Mail des
 entspr. Providers zu wenden oder verl�uft so etwas sowieso im Sand und
 ist den Aufwand nicht wert?


 
Vielen Dank schon mal
Chris


-- 
Haeufig gestellte Fragen und Antworten (FAQ): 
http://www.de.debian.org/debian-user-german-FAQ/

Zum AUSTRAGEN schicken Sie eine Mail an [EMAIL PROTECTED]
mit dem Subject "unsubscribe". Probleme? Mail an [EMAIL PROTECTED] (engl)

Antwort per Email an