[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20071022203419.GC18923@lboro.ac.uk>
Date: Mon, 22 Oct 2007 21:34:19 +0100
From: A.L.M.Buxey@...ro.ac.uk
To: Valery Marchuk <tecklord@...uritylab.ru>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Distributed SSH username/password
brute forceattack
Hi,
> Oct 22 20:36:13 nms sshd[90657]: Failed password for invalid user gopher
> from 77.46.152.2 port 55120 ssh2
user/password authentication for SSH? one way of cleaning up your
logs and killing this type of attack is to reconfigure your OpenSSH
to only allow key based logins. stopped my 10M+ logfiles straight away
(then the apache attacks were easier to see too ;-) )
alan
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists