[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: Questions concerning Security Log



On Apr 8, 2005 5:33 AM, Robert Spangler <bms zoominternet net> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On Thursday 07 April 2005 16:08, Dotan Cohen wrote:
> 
> >  I would like nothing more than to use iptables to block them. Trouble
> >  is, I can't seem to start firestarter. I get this error:
> >
> >  And I know that eth0 is working because I am on the internet now!
> 
> First run ifconfig to ensure there isn't some alias setup for your ethernet
> port.
> 
> If everything looks good then to drop all ssh connections;
> 
> iptables -A INPUT -i <eth?> -p tcp -m tcp --dport 22 -m state --state NEW -j
> DROP
> 
> or to drop targetted addresses;
> 
> iptables -A INPUT -i <eth?> -p tcp -m tcp -s <source ip> --dport 22 -m state
> - --state NEW -j DROP
> 
> both must be on on line.
> 
> - --
> 
> Regards
> Robert
> 
> Smile... it increases your face value!
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.6 (GNU/Linux)
> 
> iD8DBQFCVe2C0xJrO8dQYHgRAtknAJ4gLtSszYSZG6N8SL6yubzK1J86uwCfTzTD
> m9ngO3zMoObcibzkw1GYs4E=
> =haQE
> -----END PGP SIGNATURE-----
> 




> First run ifconfig to ensure there isn't some alias setup for your ethernet
> port.

This is what I got:
eth0      Link encap:Ethernet  HWaddr 00:0D:87:29:C4:00
          inet addr:172.27.14.121  Bcast:255.255.255.255  Mask:255.255.240.0
          inet6 addr: fe80::20d:87ff:fe29:c400/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:3697172 errors:0 dropped:0 overruns:0 frame:0
          TX packets:158594 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:360217349 (343.5 MiB)  TX bytes:23759055 (22.6 MiB)
          Interrupt:11 Base address:0xd400

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:3093 errors:0 dropped:0 overruns:0 frame:0
          TX packets:3093 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:3671398 (3.5 MiB)  TX bytes:3671398 (3.5 MiB)

ppp0      Link encap:Point-to-Point Protocol
          inet addr:192.117.111.61  P-t-P:192.117.122.13  Mask:255.255.255.255
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1460  Metric:1
          RX packets:136970 errors:0 dropped:0 overruns:0 frame:0
          TX packets:124998 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:3
          RX bytes:110074869 (104.9 MiB)  TX bytes:15253397 (14.5 MiB)


> If everything looks good then to drop all ssh connections;
> iptables -A INPUT -i <eth?> -p tcp -m tcp --dport 22 -m state --state NEW -j
> DROP
> 
> or to drop targetted addresses;
> iptables -A INPUT -i <eth?> -p tcp -m tcp -s <source ip> --dport 22 -m state
> - --state NEW -j DROP

I see that the attacker is comming from multiple IP's. Although I
currently do not ssh into this comupter, I would like to leave that
option open. Acually, I would like to set that up as soon as possible.
What should I block if I am being attacked by several IP's, but I do
not want to block ssh altogether?

By the way, the attacker is trying to access me by logging into
different accounts on my computer, such as:
oracle
richard
personal
eddie

I am compiling a list of these names, so that I will know never to
make a user account with one of them. Would anybody else be interested
in this list? I think that it would be good to warn users who try to
create accounts with these names that they may be less secure in the
event of an attack such as this one. Or am I exaggerating?

Dotan Cohen

http://Liriks-Song.com/
http://Song-Liriks.com/


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]