On Fri, Jan 28, 2005 at 10:51:47PM -0800, Stewart Stremler wrote:
> begin  quoting Tracy R Reed as of Fri, Jan 28, 2005 at 10:39:08PM -0800:
> [snip]
> > I consider the chances of anyone actually brute forcing a password by
> > entering at the login prompt extremely remote. I can't think of a single
> > case I have ever seen where that actually happened if the password was not
> > set to some incredibly stupid default or "password". Especially given that
> 
>   .
>   .
>   .
> Jan 28 13:54:13 straumli sshd[9412]: [ID 800047 auth.info] Failed
> password for root from 212.71.168.123 port 34079 ssh2

I don't allow remote root log in. Log in as a user and su if you need
to.

> Jan 28 13:54:16 straumli sshd[9414]: [ID 800047 auth.info] Illegal user
> test from 212.71.168.123
> Jan 28 13:54:16 straumli sshd[9414]: [ID 800047 auth.info] Failed
> password for illegal user test from 212.71.168.123 port 34234 ssh2
> Jan 28 13:54:19 straumli sshd[9416]: [ID 800047 auth.info] Illegal user
> test from 212.71.168.123
> Jan 28 13:54:19 straumli sshd[9416]: [ID 800047 auth.info] Failed
> password for illegal user test from 212.71.168.123 port 34289 ssh2
> Jan 28 13:54:26 straumli sshd[9418]: [ID 800047 auth.info] Illegal user
> test from 212.71.168.123
> Jan 28 13:54:26 straumli sshd[9418]: [ID 800047 auth.info] Failed
> password for illegal user test from 212.71.168.123 port 34430 ssh2
>   .
>   .
>   .

Stewart has a little friend ...

-- 
Lan Barnes                    [EMAIL PROTECTED]
Linux Guy, SCM Specialist     858-354-0616
-- 

KPLUG-List mailing list
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to