Hi, 

My SSH server is being attacked since a few days, ossec detects it but does 
not initiate an active response resulting in blocking the remote host.

Therefore, any other types of attacked result in ossec active responses, as 
for an example if i try to attack myself from an external connection, ssh 
authentication failures result in ossec active response. (authentication 
failures)

Does anyone could explain me why ? If i'm not wrong the host does not 
supply any password, is it the reason why there is active response ? 

Here the alert log generated by ossec in relation with this connection 
attempt:

** Alert 1355053924.344329: mail  - 
syslog,access_control,authentication_failed,2012 Dec 09 12:52:04 (XXXXXXXXX) 
XXX.XXX.XXX.XXX->/var/log/auth.logRule: 2502 (level 10) -> 'User missed the 
password more than one time'Dec  9 12:52:03 XXXXXXXXXXX sshd[4676]: PAM 2 more 
authentication failures; logname= uid=0 euid=0 tty=ssh ruser= 

rhost=174-143-56-97.static.cloud-ips.com  user=root


The same host is detected with an other rule because it's trying to connect 
using a non existing user or non authorized:


** Alert 1355053924.343978: - 
syslog,sshd,invalid_login,authentication_failed,2012 Dec 09 12:52:04 
(XXXXXXXXX) XXX.XXX.XXX.XXX->/var/log/auth.logRule: 5710 (level 5) -> 'Attempt 
to login using a non-existent user'Src IP: 174.143.56.97Dec  9 12:52:03 
XXXXXXXXXXX sshd[4676]: Failed password for invalid user root from 
174.143.56.97 port 53770 ssh2


   

Thanks!


Regards,


Guilhem





Reply via email to