As long as they dont know your password, username and it isnt an easy dictonary 
password.
(which you said it isnt), you should be quite secure enuf :) I see these all 
the time on my 
companys servers and we are yet to get anyone even get the right username.

I dont know if it works on gentoo as i havent tried it yet, but on my Fedora 
boxes i use a 
program called BFD - Brute Force Detector* (Needs APF**) and it automaticly 
bans the ip from
the box using IPTables. Works quite well.

(At this point I'll point out the normal about I tried it on my gentoo dev box 
and it floored
all contact with the outter world, try at your own risk)

* http://www.rfxnetworks.com/bfd.php
** http://www.rfxnetworks.com/apf.php

-----
Alex A. Smith MCP
ASMHosting.com Owner


Antonio Coralles wrote:

>I'm running sshd on my personal computer to be able to log in from
>different machines. To tighten security without disabling pam i've
>created a user which is not in groop weel, and configured ssh to accept
>logins for this user only. By the way all passwords on my system are
>well choosen and should be invulnerable to dictonary attacs.
>
>As # cat /var/log/sshd/current  normaly looks something like
>
> Apr 21 15:17:26 [sshd] Did not receive identification string from
>211.20.75.83
>Apr 21 18:05:16 [sshd] Invalid user test from 213.244.22.178
>Apr 21 18:05:16 [sshd] reverse mapping checking getaddrinfo for
>reverse.completel.net failed - POSSIBLE BREAKIN ATTEMPT!
>Apr 21 18:05:16 [sshd] User guest not allowed because shell /dev/null is
>not executable
>Apr 21 18:05:16 [sshd] reverse mapping checking getaddrinfo for
>reverse.completel.net failed - POSSIBLE BREAKIN ATTEMPT!
>Apr 21 18:05:17 [sshd] Invalid user admin from 213.244.22.178
>Apr 21 18:05:17 [sshd] reverse mapping checking getaddrinfo for
>reverse.completel.net failed - POSSIBLE BREAKIN ATTEMPT!
>Apr 21 18:05:17 [sshd] Invalid user admin from 213.244.22.178
>Apr 21 18:05:17 [sshd] reverse mapping checking getaddrinfo for
>reverse.completel.net failed - POSSIBLE BREAKIN ATTEMPT!
>Apr 21 18:05:18 [sshd] Invalid user user from 213.244.22.178
>Apr 21 18:05:18 [sshd] reverse mapping checking getaddrinfo for
>reverse.completel.net failed - POSSIBLE BREAKIN ATTEMPT!
>                - Last output repeated twice -
>Apr 21 18:05:18 [sshd] User root not allowed because not listed in
>AllowUsers
>Apr 21 18:05:19 [sshd] reverse mapping checking getaddrinfo for
>reverse.completel.net failed - POSSIBLE BREAKIN ATTEMPT!
>Apr 21 18:05:19 [sshd] User root not allowed because not listed in
>AllowUsers
>Apr 21 18:05:20 [sshd] reverse mapping checking getaddrinfo for
>reverse.completel.net failed - POSSIBLE BREAKIN ATTEMPT!
>Apr 21 18:05:20 [sshd] User root not allowed because not listed in
>AllowUsers
>Apr 21 18:05:20 [sshd] Invalid user test from 213.244.22.178
>Apr 21 18:05:20 [sshd] reverse mapping checking getaddrinfo for
>reverse.completel.net failed - POSSIBLE BREAKIN ATTEMPT!
>Apr 21 19:02:44 [sshd] Did not receive identification string from
>62.193.229.154
>
>i would like to know if sshd is really secure as long as nobody who
>shouldn't has the correct username and password.
>
>thanks
>antonio
>  
>

-- 
[email protected] mailing list

Reply via email to