Questions concerning Security Log
Dotan Cohen
dotancohen at gmail.com
Fri Apr 8 07:36:26 UTC 2005
On Apr 8, 2005 5:33 AM, Robert Spangler <bms at zoominternet.net> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On Thursday 07 April 2005 16:08, Dotan Cohen wrote:
>
> > I would like nothing more than to use iptables to block them. Trouble
> > is, I can't seem to start firestarter. I get this error:
> >
> > And I know that eth0 is working because I am on the internet now!
>
> First run ifconfig to ensure there isn't some alias setup for your ethernet
> port.
>
> If everything looks good then to drop all ssh connections;
>
> iptables -A INPUT -i <eth?> -p tcp -m tcp --dport 22 -m state --state NEW -j
> DROP
>
> or to drop targetted addresses;
>
> iptables -A INPUT -i <eth?> -p tcp -m tcp -s <source ip> --dport 22 -m state
> - --state NEW -j DROP
>
> both must be on on line.
>
> - --
>
> Regards
> Robert
>
> Smile... it increases your face value!
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.6 (GNU/Linux)
>
> iD8DBQFCVe2C0xJrO8dQYHgRAtknAJ4gLtSszYSZG6N8SL6yubzK1J86uwCfTzTD
> m9ngO3zMoObcibzkw1GYs4E=
> =haQE
> -----END PGP SIGNATURE-----
>
> First run ifconfig to ensure there isn't some alias setup for your ethernet
> port.
This is what I got:
eth0 Link encap:Ethernet HWaddr 00:0D:87:29:C4:00
inet addr:172.27.14.121 Bcast:255.255.255.255 Mask:255.255.240.0
inet6 addr: fe80::20d:87ff:fe29:c400/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:3697172 errors:0 dropped:0 overruns:0 frame:0
TX packets:158594 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:360217349 (343.5 MiB) TX bytes:23759055 (22.6 MiB)
Interrupt:11 Base address:0xd400
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:3093 errors:0 dropped:0 overruns:0 frame:0
TX packets:3093 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:3671398 (3.5 MiB) TX bytes:3671398 (3.5 MiB)
ppp0 Link encap:Point-to-Point Protocol
inet addr:192.117.111.61 P-t-P:192.117.122.13 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1460 Metric:1
RX packets:136970 errors:0 dropped:0 overruns:0 frame:0
TX packets:124998 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:3
RX bytes:110074869 (104.9 MiB) TX bytes:15253397 (14.5 MiB)
> If everything looks good then to drop all ssh connections;
> iptables -A INPUT -i <eth?> -p tcp -m tcp --dport 22 -m state --state NEW -j
> DROP
>
> or to drop targetted addresses;
> iptables -A INPUT -i <eth?> -p tcp -m tcp -s <source ip> --dport 22 -m state
> - --state NEW -j DROP
I see that the attacker is comming from multiple IP's. Although I
currently do not ssh into this comupter, I would like to leave that
option open. Acually, I would like to set that up as soon as possible.
What should I block if I am being attacked by several IP's, but I do
not want to block ssh altogether?
By the way, the attacker is trying to access me by logging into
different accounts on my computer, such as:
oracle
richard
personal
eddie
I am compiling a list of these names, so that I will know never to
make a user account with one of them. Would anybody else be interested
in this list? I think that it would be good to warn users who try to
create accounts with these names that they may be less secure in the
event of an attack such as this one. Or am I exaggerating?
Dotan Cohen
http://Liriks-Song.com/
http://Song-Liriks.com/
More information about the fedora-list
mailing list