1 |
On 05 June 2006 16:06, Leandro Melo de Sales wrote: |
2 |
> Hi, |
3 |
> |
4 |
> today when I was checking the server log I got many external |
5 |
> attempts to connect to my sshd service: |
6 |
> |
7 |
> ... |
8 |
> Jun 5 05:09:45 embedded sshd[4740]: Invalid user barbara from x.y.w.z |
9 |
> Jun 5 05:09:46 embedded sshd[4742]: Invalid user barb from x.y.w.z |
10 |
> Jun 5 05:09:48 embedded sshd[4744]: Invalid user barbie from x.y.w.z |
11 |
> Jun 5 05:09:50 embedded sshd[4746]: Invalid user barbra from x.y.w.z |
12 |
> Jun 5 05:09:51 embedded sshd[4748]: Invalid user barman from x.y.w.z |
13 |
> Jun 5 05:09:53 embedded sshd[4750]: Invalid user barney from x.y.w.z |
14 |
> ... |
15 |
> |
16 |
> this seems to be a brute force attack, but one thing that worried me |
17 |
> is why sshd didn't disconnect the remote host after 3 unsuccessful |
18 |
> attemps? If we see in the log, there are many attemps with time |
19 |
> interval between attemps of 2 or 3 seconds meaning that the sshd |
20 |
> didn't disconnect the remote host after 3 attempts. |
21 |
> So, first, Am I thinking correct about the sshd attempts? |
22 |
> Second, how can I setup sshd or the entire system to permit just 2 or |
23 |
> 3 attempts of authentication? I was checking the /etc/login.defs file |
24 |
> and I see the following option: |
25 |
> |
26 |
> # |
27 |
> # Max number of login retries if password is bad |
28 |
> # |
29 |
> LOGIN_RETRIES 3 |
30 |
> |
31 |
> but why this didn't work for the above connection attempts? |
32 |
|
33 |
Because it wasn't a bad password. It never got to that stage. ;-) |
34 |
|
35 |
Uwe |
36 |
|
37 |
-- |
38 |
Mark Twain: I rather decline two drinks than a German adjective. |
39 |
-- |
40 |
gentoo-user@g.o mailing list |