While logwatch.pl is still not being run from root's crontab, my manual
running this morning starts with a log report I've not before seen:

  --------------------- Selinux Audit Begin ------------------------

  **Unmatched Entries** (Only first 10 out of 713 are printed)
   type=1326 audit(1405757401.043:10184): auid=4294967295 uid=33 gid=33
ses=4294967295 pid=16637 comm="sshd" sig=31 syscall=102 compat=0
ip=0xb73dd922 code=0x0
   type=1326 audit(1405757404.968:10185): auid=4294967295 uid=33 gid=33
ses=4294967295 pid=16639 comm="sshd" sig=31 syscall=102 compat=0
ip=0xb7383922 code=0x0

   This looks to be reports of attempts to crack the network via sshd, yet
these attempts are also found in the sshd section:

  --------------------- SSHD Begin ------------------------

  Disconnecting after too many authentication failures for user:
     admin : 103 Time(s)
     root : 610 Time(s)

  Failed logins from:
     61.174.50.235 (235.50.174.61.dial.wz.zj.dynamic.163data.com.cn): 153
times
     61.174.51.196 (196.51.174.61.dial.wz.zj.dynamic.163data.com.cn): 297
times
     61.174.51.204 (204.51.174.61.dial.wz.zj.dynamic.163data.com.cn): 40
times

   What is the selinux audit telling me and how do I recognize when I need to
respond to something in there?

Rich
_______________________________________________
PLUG mailing list
[email protected]
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to