On Thu, Feb 12, 2009 at 12:57:21AM -0500, Norman Bird wrote: > I decided to check the auth.log and started freaking out because I saw alot > of POSSIBLE BREAK-IN lines. then I saw roon loging in so I was panicking. > But as I really reviewed them it seems that the actual root logins were by > CRON and the nobody logins were system related. Please look this over and > give any advice and particularily what should I do. > > Somewhere online said I should "boot with a root kit checker", feel free to > advise on this. > > I do need to log in via putty via ssh alot so I cant totally disable it. I > will beef up my password now and maybe change the port, but I need input on > that please, or a good site. > > Thanks > > Norm > > Feb 11 03:39:01 localhost CRON[29603]: (pam_unix) session opened for user > root by (uid=0) > Feb 11 03:39:01 localhost CRON[29603]: (pam_unix) session closed for user > root > Feb 11 03:39:01 localhost CRON[29601]: (pam_unix) session closed for user > root
These above are syslog messages from cron, telling you root logged in ,
we more like cron changed userid to root to run something
> Feb 11 03:53:33 localhost sshd[29969]: Did not receive identification string
> from 66.212.18.86
> Feb 11 03:55:20 localhost sshd[30015]: reverse mapping checking getaddrinfo
> for alpha57.wqpax.net failed - POSSIBLE BREAK-IN
> ATTEMPT!
> Feb 11 03:55:20 localhost sshd[30015]: (pam_unix) authentication failure;
> logname= uid=0 euid=0 tty=ssh ruser=
> rhost=66.212.18.86 user=root
> Feb 11 03:55:22 localhost sshd[30015]: Failed password for root from
> 66.212.18.86 port 41396 ssh2
> Feb 11 03:55:23 localhost sshd[30019]: reverse mapping checking getaddrinfo
> for alpha57.wqpax.net failed - POSSIBLE BREAK-IN
> ATTEMPT! rhost=66.212.18.86
this is ssh complaining about incorrect password being supplied, I
presume you do not allow password authentication for root !
This is some script kiddie or mutant pc try brute attack against your
sshd server, try fail2ban
>
>
> then there is this, but it looks system related i think:
>
>
[snip]
> Feb 11 07:35:05 localhost su[3921]: Successful su for nobody by root
> Feb 11 07:35:05 localhost su[3921]: + ??? root:nobody
> Feb 11 07:35:05 localhost su[3921]: (pam_unix) session opened for user
> nobody by (uid=0)
> Feb 11 07:35:05 localhost su[3921]: (pam_unix) session closed for user
> nobody
> Feb 11 07:35:05 localhost su[3924]: Successful su for nobody by root
> Feb 11 07:35:05 localhost su[3924]: + ??? root:nobody
> Feb 11 07:35:05 localhost su[3924]: (pam_unix) session opened for user
> nobody by (uid=0)
> Feb 11 07:35:05 localhost su[3924]: (pam_unix) session closed for user
> nobody
> Feb 11 07:35:06 localhost su[3926]: Successful su for nobody by root
> Feb 11 07:35:06 localhost su[3926]: + ??? root:nobody
> Feb 11 07:35:06 localhost su[3926]: (pam_unix) session opened for user
> nobody by (uid=0)
> Feb 11 07:36:26 localhost su[3926]: (pam_unix) session closed for user
> nobody
looks to me like a processes running as root su'ed from root to nobody
[snip]
> Is there another log that would show a definate successful breakin?
>
> thanks
>
> Norm
apart from the brute force attack nothing really to worry about
--
I never vote for anyone. I always vote against.
-- W. C. Fields
signature.asc
Description: Digital signature

