pkgsrc-Users archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: NetBSD-3.1 was attacked: Bug of SSHD or cyrus-sasl?
Pooling two emails in one:
On Jan 12, 2007, at 4:17 AM, Water NB wrote:
But this morning I found the cracker still logined the system after
only
two tries.
It is impossible to try 2 times to get the correct password.
So I guess that he used the bug of sshd.
What bug? I don't know.
Seems as if it were a sshd bug he'd been in earlier? cyrus is most
likely.
Nothing leapt out when I checked secunia.org though.
Question 5) empty password means needn't password?
Or means any passwords are invalid?
There is a config setting
PermitEmptyPasswords no
to help in case some get created by mistake.
===============================
On Jan 12, 2007, at 6:20 AM, Eric Rudolph Pizzani wrote:
Is there a way of implementing a block on any IP addresses that
try to login too much? That would probably slow down the crackers
ability to brute force a login, or whatever it is that he does.
see http://denyhosts.sourceforge.net/
for a pretty capable solution, if you don't mind having python running.
Also see some tips from Alex at
http://restorecd.homeunix.org/NetBSD/
for a script that you might use/tweak that is similar in effect to
DenyHosts plus info on spawning a sleep command in hosts.deny that
deters most 'bot attacks due to timeout.
Luck,
Brian
Home |
Main Index |
Thread Index |
Old Index