Should I Be Worried !
I have picked up the following entries in /var/log/messages
It is obviously an attempt to get into my box, which I don't think succeeded. But how can I tell for sure ?
Jul 28 21:31:51 slackbox sshd: Invalid user test from 188.8.131.52
Jul 28 21:31:51 slackbox sshd: Failed password for invalid user test from 184.108.40.206 port 33234 ssh2
Jul 28 21:31:52 slackbox sshd: Invalid user guest from 220.127.116.11
Jul 28 21:31:52 slackbox sshd: Failed password for invalid user guest from 18.104.22.168 port 33271 ssh2
Jul 28 21:31:53 slackbox sshd: Invalid user admin from 22.214.171.124
Jul 28 21:31:53 slackbox sshd: Failed password for invalid user admin from 126.96.36.199 port 33312 ssh2
Jul 28 21:31:54 slackbox sshd: Invalid user admin from 188.8.131.52
Jul 28 21:31:54 slackbox sshd: Failed password for invalid user admin from 184.108.40.206 port 33347 ssh2
Jul 28 21:31:54 slackbox sshd: Invalid user user from 220.127.116.11
Jul 28 21:31:54 slackbox sshd: Failed password for invalid user user from 18.104.22.168 port 33380 ssh2
Jul 28 21:31:55 slackbox sshd: Failed password for root from 22.214.171.124 port 33419 ssh2
Jul 28 21:31:56 slackbox sshd: Failed password for root from 126.96.36.199 port 33450 ssh2
Jul 28 21:31:57 slackbox sshd: Failed password for root from 188.8.131.52 port 33477 ssh2
Jul 28 21:31:57 slackbox sshd: Invalid user test from 184.108.40.206
Jul 28 21:31:57 slackbox sshd: Failed password for invalid user test from 220.127.116.11 port 33511 ssh2
I have checked
and nothing seems amiss, although I am not really sure what I am looking for ! I have posted it below for info:
I have run both chkrootkit and rkhunter and both report no errors or problems.
:~$ cat /etc/passwd
rpc:x:32:32:RPC portmap user:/:/bin/false
I have installed "webmin" and beefed up ssh security by blocking root logins and allowing only ssh2 connections.
Is there anywhere else I should be looking for trouble, or anything I should do to block this sort activity out please ?
The IP mentioned in the logs eminates from Moscow. I don't know much more than that at the moment.
The box in question is running Slack 10.1 on a 2.4.29 kernel with Win XP dual booting on a seperate drive. It is just a home box that I am using to learn linux. It has Apache, MYSQL etc running on "localhost" but as far as I know they do not face the internet. The only other servers that I think are running would be sendmail (?), although I am unsure how to check what is running and what is not. I use a modem router which acts for DHCP, NAT and firewall.
Any advice appreciated. If you need any more info then let me know.
if you have strong passwords, there is not much chance they get in.
just make sure you don't allow root logins through ssh.
Debian has a nice piece about ssh security:
I get a lot of brute force ssh attempts. Damn script kiddies. They never get through. If you don't use ssh yourself I would either disable the daemon or tell your router not to forward port 22 - which is a little bit safer.
Thanks for the replies.
I do use ssh to access my home box from work, but not vice versa.
If everyone seems happy that the potential intruder has not actually got in, I will just beef up my passwords a bit and keep an eye on the situation. I have been trying to set up passphrases using ssh-keygen but am having trouble copying the keys from the work box to the home box, if anyone can give me some advice on that process.
I will do a bit more reading on the subject. Would it be right to assume that the passphrases and keys route will be more secure that username and password logins.
It looks like they are not successful, but you don't know that positively. I think it's a pretty safe bet, though, based on what you see and don't see.
Does slackware use xinetd or inetd as its super server? Either way, I would suggest restricting access to a range of IPs using xinetd's mechanism or tcp wrappers. Block the guy so he doesn't get a logon prompt at all.
You're going to get these warnings, no matter what. People are just stupid and will try anything. This is why strong passwords should be required, and non guessable usernames are just as good.
Those are entirely normal, the moment I set up my server my logs got flooded with them. People will try common passwords on your system, but if you just use a random pass there's pretty much zero chance of them getting in. Only trouble is it can slow your box down, I've had bad slowdowns on my (admittedly crap) server, due to 30+ SSH login attempts a second, from a single IP. iptables is useful..
If the OP ever reads this thread again, I still would suggest restricting access via tcp wrappers. Strong passwords are fine, but why give them the chance to log in at all?
Another form of protection is to block out port 22 and use something beyond port 4000. You can create this configuration in /etc/ssh/sshd_conf file and restart sshd.
Remember to utilize this port upon logging in. To 100% secure this server from attacks like this is to null root access from the outside. Create a user and sudo to root IF you have to do anything requiring root access.