[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: SSH: Brute-force Attacken abfangen?
[Thread Prev] | [Thread Next]
- Subject: Re: SSH: Brute-force Attacken abfangen?
- From: Michael Lestinsky <michael.lestinsky@xxxxxxxxxxxxx>
- Date: Wed, 24 Jan 2007 13:04:43 +0100
- To: uugrn@xxxxxxxxxxxxxxx
Michael Lestinsky wrote on 24.01.2007: > Brute-force-Attacken via SSH Ich habe gerade im FreeBSD-Portsbaum dieses Projekt entdeckt: .----- | michael@mobi:~> portsearch -d denyhosts | /usr/ports/security/denyhosts | | DenyHosts is a script intended to be run by *ix system administrators to | help thwart ssh server attacks. | | If you've ever looked at your ssh log (/var/log/auth.log ) you may be alarmed | to see how many hackers attempted to gain access to your server. | Denyhosts helps you: | - Parses /var/log/auth.log to find all login attempts | - Can be run from the command line, cron or as a daemon (new in 0.9) | - Records all failed login attempts for the user and offending host | - For each host that exceeds a threshold count, records the evil host | - Keeps track of each non-existent user (eg. sdada) when a login attempt failed. | - Keeps track of each existing user (eg. root) when a login attempt failed. | - Keeps track of each offending host (hosts can be purged ) | - Keeps track of suspicious logins | - Keeps track of the file offset, so that you can reparse the same file | - When the log file is rotated, the script will detect it | - Appends /etc/hosts.allow | - Optionally sends an email of newly banned hosts and suspicious logins. | - Resolves IP addresses to hostnames, if you want | | WWW: http://denyhosts.sourceforge.net/ `----- Und verwandt: http://freebsd.munk.me.uk/archives/209-Block-Brute-Force-Attacks-Against-sshd-and-proftpd-Using-blockhosts.html Ich werde mir beide Projekte mal gruendlich anschauen. Bye, Michael -- Michael Lestinsky Max-Planck-Institut fuer Kernphysik michael.lestinsky@xxxxxxxxxxxxx Saupfercheckweg 1; 69117 Heidelberg Phone +49 6221 516-202 Fax -602 http://www.mpi-hd.mpg.de -- http://mailman.uugrn.org/mailman/listinfo/uugrn