› Foros › PC › Software libre
skynet escribió:May 1 21:06:04 skynet sshd[2589]: Did not receive identification string from ::ffff:201.15.101.130
May 1 21:17:03 skynet sshd[2736]: reverse mapping checking getaddrinfo for 201-15-101-130.cbace300.ipd.brasiltelecom.net.br failed -
POSSIBLE BREAKIN ATTEMPT!
May 1 21:17:07 skynet sshd[2741]: reverse mapping checking getaddrinfo for 201-15-101-130.cbace300.ipd.brasiltelecom.net.br failed -
POSSIBLE BREAKIN ATTEMPT!
May 1 21:17:13 skynet sshd[2744]: reverse mapping checking getaddrinfo for 201-15-101-130.cbace300.ipd.brasiltelecom.net.br failed -
POSSIBLE BREAKIN ATTEMPT!
May 1 21:17:19 skynet sshd[2746]: reverse mapping checking getaddrinfo for 201-15-101-130.cbace300.ipd.brasiltelecom.net.br failed -
POSSIBLE BREAKIN ATTEMPT!
.....
May 1 21:18:08 skynet sshd[2768]: reverse mapping checking getaddrinfo for 201-15-101-130.cbace300.ipd.brasiltelecom.net.br failed -
POSSIBLE BREAKIN ATTEMPT!
May 1 21:20:02 skynet sshd[2837]: reverse mapping checking getaddrinfo for 201-15-101-130.cbace300.ipd.brasiltelecom.net.br failed -
POSSIBLE BREAKIN ATTEMPT!
...
May 1 21:20:02 skynet sshd[2837]: Illegal user administrator from ::ffff:201.15.101.130
May 2 00:52:09 skynet sshd[4590]: Illegal user test from ::ffff:61.211.230.98
May 2 00:52:12 skynet sshd[4592]: Illegal user test from ::ffff:61.211.230.98
May 2 00:52:16 skynet sshd[4594]: Illegal user test from ::ffff:61.211.230.98
May 2 01:02:16 skynet sshd[4596]: fatal: Timeout before authentication for ::ffff:61.211.230.98
May 2 05:54:40 skynet sshd[5029]: Did not receive identification string from ::ffff:61.211.230.98
May 2 06:05:58 skynet sshd[5036]: Illegal user test from ::ffff:61.211.230.98
May 2 06:06:01 skynet sshd[5038]: Illegal user test from ::ffff:61.211.230.98
May 2 06:06:11 skynet sshd[5040]: Illegal user test from ::ffff:61.211.230.98
May 2 16:02:18 skynet sshd[5679]: Did not receive identification string from ::ffff:61.211.230.98
May 2 16:12:58 skynet sshd[5681]: Illegal user test from ::ffff:61.211.230.98
May 2 16:13:01 skynet sshd[5683]: Illegal user marius from ::ffff:61.211.230.98
May 2 16:13:36 skynet sshd[5703]: Illegal user soporte from ::ffff:61.211.230.98
May 2 18:04:02 skynet sshd[5714]: Did not receive identification string from ::ffff:61.241.130.174
May 2 18:11:04 skynet sshd[5718]: Illegal user admin from ::ffff:61.241.130.174
May 2 18:11:09 skynet sshd[5720]: Illegal user test from ::ffff:61.241.130.174
May 2 18:11:13 skynet sshd[5722]: Illegal user guest from ::ffff:61.241.130.174
May 2 18:21:10 skynet sshd[5722]: fatal: Timeout before authentication for ::ffff:61.241.130.174
skynet escribió:May 6 06:02:08 skynet sshd[16424]: Illegal user staff from ::ffff:222.141.66.177
May 6 06:02:12 skynet sshd[16426]: Illegal user sales from ::ffff:222.141.66.177
May 6 06:02:16 skynet sshd[16428]: Illegal user recruit from ::ffff:222.141.66.177
zuper escribió:y me han surgido unas dudas basicas:
1)el no aceptar al usuario root (yo ya lo tenia en denny) por que es? acaso no esta todo cifrado?
¿igual de peligroso que qué? Es recomendable no aceptar login de rrot desde ssh. Asi, si alguien consigue entrar como usario normal, para poder hacer "su" y entrar como root, deberia de averiguar de nuevo la contraseña, es decir, para conseguir permisos de root necesita haber reventado dos contraseñas, algo altamante improbable.zuper escribió:2)si yo entro como usuario normal y hago su es igual de peligroso?
zuper escribió:) 3)las iptables vienen por defecto en debian(estable), es para seguir el how-to de la pagina de antes
Ni idea. Si poniendo estando el puerto 22 redirigidoa tu maquina, poniendo la IP publica desde la otra maquina y estando seguro de que esa IP es la tuya, no te conecta, no se que puede pasar.zuper escribió:4)como reparo el ssh?
skynet escribió:Chain INPUT (policy ACCEPT)
target prot opt source destination
fail2ban-ssh tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
SSHD tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain SSHD (1 references)
target prot opt source destination
Chain fail2ban-ssh (1 references)
target prot opt source destination
DROP all -- 192.168.1.6 0.0.0.0/0
DROP all -- 192.168.1.5 0.0.0.0/0
RETURN all -- 0.0.0.0/0 0.0.0.0/0