Hi guys,

I believe that I have found a bug in ossec related to whitelisting for failed ssh logins


The problem is that sshd logs the failures AFTER reverse looking up the IP address, for example:


Sep 28 11:56:58 www sshd(pam_unix)[11034]: authentication failure; logname= uid=0 euid=0 tty=NODEVssh ruser= rhost=2.red-98-2-137.staticip.rima-tde.net user=root

where "2.red-98-2-137.staticip.rima-tde.net" is the reverse lookup on my ADSL's IP address of 137.2.98.2.


I have my static IP (137.2.98.2) in the whitelist, but the problem is that ossec sees in the log "2.red-98-2-137.staticip.rima-tde.net" and the active-response script is executed anyways.

I can see two solutions:

1) to be able to add host names (instead of just IPs) to the whitelist but I get a configuration error on startup if I try. 2) reconfigure sshd so that it does not perform the reverse lookups, but I have been unable to figure out how to do this.

¿Does anyone have a solution for this?

Thanks,
Charles

PD. This happens both on RedHat 9 and RHEL 4.



____________________________________________________
Institut Balear de Comunicacions, S.L.
Gremio Tejedores 22, 1
07009 Palma de Mallorca, Spain
Tel:  +34 971.45.90.99  | Mobile: +34 607.87.12.77
Fax: +34 971.43.08.18  | E-mail: [EMAIL PROTECTED]
URL: http://www.ibacom.es/
____________________________________________________


Reply via email to