chyba mam mały włam :-)
marcin steć
marcinek w nea.pl
Czw, 21 Paź 2004, 23:00:22 CEST
W /var/log/secure właśnie znalazłem toto:
Oct 21 22:36:32 vanish sshd[3532]: Illegal user rolo from
::ffff:65.198.47.75
Oct 21 22:36:32 vanish sshd[3532]: input_userauth_request: illegal user rolo
Oct 21 22:36:37 vanish sshd[3532]: Address 65.198.47.75 maps to
host75.ironhide.
com, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
Oct 21 22:36:37 vanish sshd[3532]: error: Could not get shadow
information for N
OUSER
Oct 21 22:36:37 vanish sshd[3532]: Failed password for illegal user rolo
from ::
ffff:65.198.47.75 port 44814 ssh2
Oct 21 22:36:37 vanish sshd[3532]: Received disconnect from
::ffff:65.198.47.75:
11: Bye Bye
Oct 21 22:36:39 vanish sshd[3533]: Illegal user iceuser from
::ffff:65.198.47.75
Oct 21 22:36:39 vanish sshd[3533]: input_userauth_request: illegal user
iceuser
Oct 21 22:36:39 vanish sshd[3533]: Address 65.198.47.75 maps to
host75.ironhide.
com, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
Oct 21 22:36:39 vanish sshd[3533]: error: Could not get shadow
information for N
OUSER
Kurtuazyjnie puściłem namapa pod ten adres, ale nie wyszło nic ciekawego:
Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2004-10-21 22:48
CEST
Warning: OS detection will be MUCH less reliable because we did not
find at least 1 open and 1 closed TCP port
Interesting ports on host75.ironhide.com (65.198.47.75):
(The 1662 ports scanned but not shown below are in state: filtered)
PORT STATE SERVICE
22/tcp open ssh
Device type: broadband router|router|general purpose
Running: Conexant embedded, Draytek embedded, FreeSCO Linux 2.0.X, Linux
2.4.X|2.5.X, Siemens embedded
Too many fingerprints match this host to give specific OS details
Uptime 62.033 days (since Fri Aug 20 22:04:43 2004)
Nmap run completed -- 1 IP address (1 host up) scanned in 224.000 seconds
Tak sobie się zastanawiam jaki byłby zestaw regułek iptables, żęby się
natręta pozbyć...
W zasadzi z zewnątrz to mam potrzebę wjechać wyłącznie po ssh. Porblem w
tym, że mam
jedną kartę, i na niej ip dynamiczne z kablówki i statyczne do
rozmawiania z kilkoma vmwarami. Maszyna robi też z gateway dla tychże
vmów. Dotychczasowe regułki to:
[root w vanish /root]#
iptables-save
# Generated by iptables-save v1.2.11 on Thu Oct 21 22:58:58 2004
*nat
:PREROUTING ACCEPT [15447:811805]
:POSTROUTING ACCEPT [30923:1588841]
:OUTPUT ACCEPT [30939:1592202]
-A POSTROUTING -s 172.16.80.0/255.255.240.0 -j MASQUERADE
COMMIT
# Completed on Thu Oct 21 22:58:58 2004
# Generated by iptables-save v1.2.11 on Thu Oct 21 22:58:58 2004
*filter
:INPUT ACCEPT [103728:43556812]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [141277:93871525]
-A FORWARD -s 172.16.80.0/255.255.240.0 -j ACCEPT
-A FORWARD -d 172.16.80.0/255.255.240.0 -j ACCEPT
COMMIT
# Completed on Thu Oct 21 22:58:58 2004
pozdrawiam
maricnek
Więcej informacji o liście dyskusyjnej pld-users-pl