On Fri, Jan 28, 2005 at 10:51:47PM -0800, Stewart Stremler wrote: > begin quoting Tracy R Reed as of Fri, Jan 28, 2005 at 10:39:08PM -0800: > [snip] > > I consider the chances of anyone actually brute forcing a password by > > entering at the login prompt extremely remote. I can't think of a single > > case I have ever seen where that actually happened if the password was not > > set to some incredibly stupid default or "password". Especially given that > > . > . > . > Jan 28 13:54:13 straumli sshd[9412]: [ID 800047 auth.info] Failed > password for root from 212.71.168.123 port 34079 ssh2
I don't allow remote root log in. Log in as a user and su if you need to. > Jan 28 13:54:16 straumli sshd[9414]: [ID 800047 auth.info] Illegal user > test from 212.71.168.123 > Jan 28 13:54:16 straumli sshd[9414]: [ID 800047 auth.info] Failed > password for illegal user test from 212.71.168.123 port 34234 ssh2 > Jan 28 13:54:19 straumli sshd[9416]: [ID 800047 auth.info] Illegal user > test from 212.71.168.123 > Jan 28 13:54:19 straumli sshd[9416]: [ID 800047 auth.info] Failed > password for illegal user test from 212.71.168.123 port 34289 ssh2 > Jan 28 13:54:26 straumli sshd[9418]: [ID 800047 auth.info] Illegal user > test from 212.71.168.123 > Jan 28 13:54:26 straumli sshd[9418]: [ID 800047 auth.info] Failed > password for illegal user test from 212.71.168.123 port 34430 ssh2 > . > . > . Stewart has a little friend ... -- Lan Barnes [EMAIL PROTECTED] Linux Guy, SCM Specialist 858-354-0616 -- KPLUG-List mailing list [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
