Sorry. It's my terminology that's off. When I said that SME6Admin reports that my port is open, I should have said that it reports that a *session* is open. In fact, I just had the same thing happen this morning.
Here's the text of the SME6Admin email:
----------------------------------------------------
my.domain :Fri Aug 12 05:20:25 2005 There are 1 opened SSH sessions on the server You had fixed the alert limit at 1 sessions Use the server-manager to handle this problem Check that it is known administrative connections, and not hackers.
----------------------------------------------------
I received such a report every 5 minutes from 5:20 - 5:55 and then a last one at 6:01 AM.
Interestingly, my messages log file shows pairs of entries like this...
----------------------------------------------------
Aug 12 05:11:42 linuxpc sshd[14840]: Illegal user b from 221.186.68.66
Aug 12 05:11:43 linuxpc sshd[14838]: reverse mapping checking getaddrinfo for host0.connectable.reality.com.64.68.186.221.in-addr.arpa failed - POSSIBLE BREAKIN ATTEMPT!
----------------------------------------------------
... about every second or so from 5:11 to 6:01. I don't understandy why SME6Admin didn't report any opened sessions from 5:11 to 5:20.
(note the near-reciprical relationship between the two addresses - Is that relevant? The latter address is that of a dedicated server that was likely used as a relay)
So why is there an apparent conflict between the two reports? One is showing an open *session* (not port) and the other is reporting unsuccessful login attempts. I have passwords disabled and allow only key access, so I feel relatively safe.
Also, what is this "reverse mapping" all about? Is this the latest trend for hackers? I haven't seen those entries in my logs before.
Lastly, I'd really like to quiet my logs (and provide peace of mind) by only allowing access from certain ip addresses. I've resisted this for some time, because I like the flexibility, but this recent rash of SSH hacks has be a bit nervous. What is the proper syntax for lists of allowed hosts with the following command I found in the forums:
----------------------------------------------------
/sbin/e-smith/db configuration setprop sshd AllowHosts <list>
where <list> is a comma separated list of IP addresses and/or netmasks (e.g. 16.17.18.19,203.14.64.0/24).
----------------------------------------------------
I certainly will want to include the range of computers on my own network 192.168.0.X as well a couple of remote locations that I access my server from. I don't understand what the "/24" does in the above example. Does that include all addresses ending in the range X.X.X.0 to X.X.X.24?
Thanks in advance for any guidance.
Rob