Koozali.org: home of the SME Server

Obsolete Releases => SME Server 7.x => Topic started by: pblanco on December 17, 2007, 02:44:00 AM

Title: SSH Log noise
Post by: pblanco on December 17, 2007, 02:44:00 AM
Hi there, I dont know if any one spot this before, but check my messages log file I found this

ec 17 08:41:16 bblatino sshd(pam_unix)[10728]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.65.233  user=root
Dec 17 08:41:19 bblatino sshd(pam_unix)[10730]: check pass; user unknown

and there are hundreds of entries like that one. This happend with all the sme servers I installed.

So what is this, I can be sure that IP isnt mine.

any help?
What can  I do?
Title: Re: Hacker attack
Post by: thomasch on December 17, 2007, 03:08:17 AM
Hi there, I dont know if any one spot this before, but check my messages log file I found this

ec 17 08:41:16 bblatino sshd(pam_unix)[10728]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.65.233  user=root
Dec 17 08:41:19 bblatino sshd(pam_unix)[10730]: check pass; user unknown

and there are hundreds of entries like that one. This happend with all the sme servers I installed.

So what is this, I can be sure that IP isnt mine.

any help?
What can  I do?


It's discussed in this forum before. Next time do a search before starting a new topic.
check this : http://forums.contribs.org/index.php?topic=23567.msg93874#msg93874 (http://forums.contribs.org/index.php?topic=23567.msg93874#msg93874)



Title: Re: Hacker attack
Post by: Normando on December 17, 2007, 05:12:12 AM
pblanco, don't post security issues here!

Please, read above your posting box. He said:

Don't report security issues here - Contact security at contribs dot org
Title: Re: SSH Log noise
Post by: pfloor on December 17, 2007, 05:15:06 AM
If you allow SSH access to your server you take the risk of bots (thousands of them) trying to access your server.  Those log entries will be expected if you allow SSH access.  To eliminate the risk you should Totally Disable SSH access to your server.  If you must allow SSH access then you can mitigate the risk as follows:

1-Use VERY STRONG passwords.

2-Set "Allow secure shell access using standard passwords" to "NO" and Use Public/Private keys.  It takes a little time to set up but I can't emphasise how critical this step is.  It requires the client and server to exchange a key and is very secure.  See http://wiki.contribs.org/SSH_Public-Private_Keys

3-Change the port from 22 to something else not in use by the server like 9122.  (This will also stop all the log noise.)


Let's not panic everyone...Topic changed to SSH Log noise
Title: Re: SSH Log noise
Post by: cactus on December 17, 2007, 05:29:32 PM
If you allow SSH access to your server you take the risk of bots (thousands of them) trying to access your server.  Those log entries will be expected if you allow SSH access.  To eliminate the risk you should Totally Disable SSH access to your server.  If you must allow SSH access then you can mitigate the risk as follows:

1-Use VERY STRONG passwords.

2-Set "Allow secure shell access using standard passwords" to "NO" and Use Public/Private keys.  It takes a little time to set up but I can't emphasise how critical this step is.  It requires the client and server to exchange a key and is very secure.  See http://wiki.contribs.org/SSH_Public-Private_Keys

3-Change the port from 22 to something else not in use by the server like 9122.  (This will also stop all the log noise.)


Let's not panic everyone...Topic changed to SSH Log noise
That is a start but all above suggested methods are pseudo methods, especially the last one will not make SSH saver, it will only stop some of the noise momentarily as those bots do not stop on scanning port 22...

The best and by far most secure option is to make use of public-private keys when connecting over SSH, there is an excellent howto in the wiki: http://wiki.contribs.org/SSH_Public-Private_Keys

This method makes use a method to compare a public key on the server with a private key on the suer site, as ling as you do not hand-out the private key no one will be able to access your server using SSH.
Title: Re: SSH Log noise
Post by: pfloor on December 17, 2007, 09:49:57 PM

That is a start but all above suggested methods are pseudo methods, especially the last one will not make SSH saver, it will only stop some of the noise momentarily as those bots do not stop on scanning port 22...
I beg to differ with you on this point.  I changed my ssh port a year ago (on advice from Shad) and went from hundreds (sometimes even thousands) of failed ssh auth log events per day to ZERO.  Since changing my port I have not had one single ssh log-in attempt (except my own) logged in almost a year.

My (somewhat limited) experience shows me that changing your ssh port does reduce log noise and by reducing (or even eliminating) the number of unwanted log-in attempts makes the server a bit more secure (IMHO).

Quote
The best and by far most secure option is to make use of public-private keys when connecting over SSH, there is an excellent howto in the wiki: http://wiki.contribs.org/SSH_Public-Private_Keys

<Paul is scratching his head> Isn't that what I said in #2? I even link to the same how-to.
Title: Re: SSH Log noise
Post by: cactus on December 17, 2007, 09:58:03 PM
I beg to differ with you on this point.  I changed my ssh port a year ago (on advice from Shad) and went from hundreds (sometimes even thousands) of failed ssh auth log events per day to ZERO.  Since changing my port I have not had one single ssh log-in attempt (except my own) logged in almost a year.

My (somewhat limited) experience shows me that changing your ssh port does reduce log noise and by reducing (or even eliminating) the number of unwanted log-in attempts makes the server a bit more secure (IMHO).
Before I switched to using private/public keys I received SSH login attempts from a broad range of IP numbers on multiple ports even above the 1024 boundary. IMHO reducing or eliminating log noise does not make your system more secure... it only lowers the risk of being discovered and consequently hacked.

<Paul is scratching his head> Isn't that what I said in #2? I even link to the same how-to.

I am scratching my head as well and wondering if I need to ask a pair of glasses from Santa ;-) Glad we agree on the point of private/public keys though... perhaps this might be a good NFR to make the system even more secure.
Title: Re: SSH Log noise
Post by: bunkobugsy on December 18, 2007, 07:22:06 AM
Guys, just wondering, how about accepting SSH from local networks only, and VPN-ing in to get local? Would that be unsafe too? (supposed our LAN is safe)
Title: Re: SSH Log noise
Post by: arnie25 on December 18, 2007, 08:34:46 AM
Guys, just wondering, how about accepting SSH from local networks only, and VPN-ing in to get local? Would that be unsafe too? (supposed our LAN is safe)
No, that would be safe enough.