Gentoo Archives: gentoo-user

From: Kent Borg <kentborg@××××.org>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Brutal force attack
Date: Mon, 06 Dec 2004 21:44:46
Message-Id: 20041206164428.K15570@borg.org
In Reply to: Re: [gentoo-user] Brutal force attack by Adrian CAPDEFIER
1 On Mon, Dec 06, 2004 at 11:28:03PM +0200, Adrian CAPDEFIER wrote:
2 > Pe data de Luni 06 Decembrie 2004 21:12, Luigi Pinna a scris:
3 > > I read now from my logs that there is someone who try to login in my
4 > > computer.
5 > > He uses always dynamic ip address or in every case he changes his ip
6 > > everyday.
7 > > What can I do?
8 > > I have all the ip but it is first time that I see an attack versus me
9 > > Thanks for the tips
10 > > Luigi
11 >
12 > is he doing that using ssh? If your computer is not a public server where
13 > people expect to connect on port 22 then you can alter the port to say 2222.
14 > One of the best security measures around :).
15
16 No! I once worked someplace where a machine was on the net and not
17 carefully maintained. ssh was running on a non-standard port, and it
18 was rooted via an unpatched hole.
19
20 I suggest keeping your machine up to date and pached with the latest
21 security fixes, and making sure you have good passwords on your
22 accounts. If you offer accounts to any friends named Frank, Joe, or
23 Jim, make sure they have good passwords, for those are very guessable
24 user names.
25
26 I get failed logins most days, but my passwords are pretty
27 unguessable. I choose a password by taking 4 bytes from /dev/random
28 and run them through mnencode. See a previous posting of mine:
29 http://www.redhat.com/archives/redhat-list/2003-March/msg02072.html.
30 My technique gives me a very memorable password that still have
31 32-bits (4 billion combinations) of entropy in it.
32
33 -kb
34
35 --
36 gentoo-user@g.o mailing list