RE: Improving server security

2005-09-19 Thread Ohad.Levy
One Other thing that I've implemented is a PAM module that checks for allowed users - i.e. if user xxx is not in the list, it will never really check its password when trying to logon... Ohad To unsubscribe, send mail to [EMAIL

Re: Improving server security

2005-09-19 Thread Tzafrir Cohen
On Mon, Sep 19, 2005 at 12:39:57PM +0200, [EMAIL PROTECTED] wrote: One Other thing that I've implemented is a PAM module that checks for allowed users - i.e. if user xxx is not in the list, it will never really check its password when trying to logon... Why a special module? Wouldn't

RE: Improving server security

2005-09-19 Thread Ohad.Levy
Of Tzafrir Cohen Sent: Monday, September 19, 2005 3:20 PM To: linux-il@linux.org.il Subject: Re: Improving server security On Mon, Sep 19, 2005 at 12:39:57PM +0200, [EMAIL PROTECTED] wrote: One Other thing that I've implemented is a PAM module that checks for allowed users - i.e. if user xxx

Improving server security

2005-09-18 Thread Gábor Szabó
I see in my log files many enrties of this type (with various usernames) Failed logins from these: aa/password from 131.247.3.147: 1 Time(s) What would be the best action with this? 1) Ignore, thet could not authenticate after all 2) put the above IP address in hosts.deny 3) put the whole

Re: Improving server security

2005-09-18 Thread Michael Ben-Nes
I would say Ignore. obviously check for updates and close the ports you dont need. If the person from this IP is a pro then any way he will get a new IP. If his just s $%^# Newbie copy paste boy then any way there million of his kind, and there are not that good at hacking updated system.

Re: Improving server security

2005-09-18 Thread Aviram Jenik
On Sunday, 18 September 2005 10:02, Gábor Szabó wrote: I see in my log files many enrties of this type (with various usernames) Failed logins from these: aa/password from 131.247.3.147: 1 Time(s) What would be the best action with this? Close the service in question if you don't need

Re: Improving server security

2005-09-18 Thread Amos Shapira
On 9/18/05, Aviram Jenik [EMAIL PROTECTED] wrote: If you choose the last, feel free to write a quick script (I won't say in what programming language) to automatically block IP's that appear in the log files as failed logins. This block should be automatically lifted after 30-60 minutes to

Re: Improving server security

2005-09-18 Thread Oleg Goldshmidt
Aviram Jenik [EMAIL PROTECTED] writes: On Sunday, 18 September 2005 10:02, Gábor Szabó wrote: I see in my log files many enrties of this type (with various usernames) Failed logins from these: aa/password from 131.247.3.147: 1 Time(s) What would be the best action with this?

Re: Improving server security

2005-09-18 Thread Geoffrey S. Mendelson
On Sun, Sep 18, 2005 at 01:40:04PM +, Oleg Goldshmidt wrote: So far I have been ignoring these (but I do read the logs). Am I too naive? Yes. I used to thing that ssh was immune to these attacks, but I was wrong. I accidently left open a userid I created for the guy that provides me email

Re: Improving server security

2005-09-18 Thread Baruch Even
Gábor Szabó wrote: I see in my log files many enrties of this type (with various usernames) Failed logins from these: aa/password from 131.247.3.147: 1 Time(s) What would be the best action with this? 1) Ignore, thet could not authenticate after all 2) put the above IP address in

Re: Improving server security

2005-09-18 Thread Amos Shapira
On 18 Sep 2005 13:40:04 +, Oleg Goldshmidt [EMAIL PROTECTED] wrote: I see a lot of those in the log of my home machine. Basically, I have ssh open and I connect to the machine myself when I am at work, travelling, etc. I am typing this mail while connected via ssh. I used to see tons of