LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-05-2011, 04:09 PM   #16
Dave_P
LQ Newbie
 
Registered: Sep 2011
Posts: 24

Original Poster
Rep: Reputation: 1

Quote:
Originally Posted by Linux_Kidd View Post
yes, sshd runs at his house, but his tablet is a dhcp client that connects to various wifi ap's. his tablet runs the ssh client and he uses it to tunnel to/through his sshd at home.
Yep, that's my setup.

Anyway, rustek answered my original question which was how to check log files for ssh attempts.

@ everyone
I apologize for going off topic (i.e ssh keys) after my solution was solved which has cause some confusion.

Last edited by Dave_P; 10-05-2011 at 04:16 PM.
 
Old 10-06-2011, 03:38 PM   #17
pwalden
Member
 
Registered: Jun 2003
Location: Washington
Distribution: Raspbian, Ubuntu, Chrome/Crouton
Posts: 374

Rep: Reputation: 50
Then the service denyhosts should be a good solution. It does not care whether the client's IP changes. It only cares when a client fails to provide a login/password after 4 or so attempts. It then adds the offending client's IP to the hosts.deny for a month. If the client correctly logs in, using less than 4 tries, then there is no issue.

I use it with my ssh server at home. I can access the server from any wifi access point using my laptop, which is a dhcp client.

All the brute force password cracker attempts on my ssh server have their IP locked out for a month after 4 tries. Typically I see about 2 crackers a day get added to deny.hosts.

Denyhosts is readily available through many distro package managers.
 
Old 10-06-2011, 04:01 PM   #18
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Rep: Reputation: 78
Quote:
Originally Posted by pwalden View Post
Then the service denyhosts should be a good solution. It does not care whether the client's IP changes. It only cares when a client fails to provide a login/password after 4 or so attempts. It then adds the offending client's IP to the hosts.deny for a month. If the client correctly logs in, using less than 4 tries, then there is no issue.

I use it with my ssh server at home. I can access the server from any wifi access point using my laptop, which is a dhcp client.

All the brute force password cracker attempts on my ssh server have their IP locked out for a month after 4 tries. Typically I see about 2 crackers a day get added to deny.hosts.

Denyhosts is readily available through many distro package managers.
it doesnt stop unauthorized authenticated access! using a key pair with password is a better solution imho. is denyhosts susceptiple to any IP spoofing attacks?
 
Old 10-06-2011, 04:09 PM   #19
rustek
Member
 
Registered: Jan 2010
Location: Melbourne, IA, USA
Distribution: Ubuntu
Posts: 93

Rep: Reputation: 8
@pwalden
Move off of port 22 and you won't get those attacks, I still scan for them but they just don't happen.

@Linux_Kidd
Quote:
it doesn't stop unauthorized authenticated access! using a key pair with password is a better solution imho.
In this case I agree.

Last edited by rustek; 10-06-2011 at 04:18 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] iptables drop and log ssh key authenticated repeat attempts akamikeym Linux - Security 6 08-25-2011 07:27 AM
ssh...log files that store the login attempts Bgrad Linux - Networking 4 03-29-2010 09:40 AM
SSH Alert when root attempts to log gamehack Linux - Software 3 06-03-2009 06:44 AM
LXer: ssh-xfer: Quickly grabbing files over an existing SSH connection LXer Syndicated Linux News 0 08-08-2008 03:11 PM
vsftpd and log files - can i up the log level to see login attempts? robr Linux - Newbie 3 04-04-2008 11:38 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:06 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration