CentOS List wrote:> Hi,
>
> My denyhosts stop working. How do i check why isnt it working anymore
> for me?
>
> Thanks
>
[snipped log entries]
at the risk alarming you at this point I strongly recommend you run
chkrootkit on your system. If your system has been compromised then
that in and of itself warrants a system reload.
after that, if it appears that you haven't been compromised I would
suggest checking the processes controlling that part of the system;
not sure off the top of my head which systems those are - sorry
about that. I recently had an experience where my web server was
cracked via the ssh service. I was running it on port 22, however I
did have it locked down to a degree meaning I was only accepting
connections from specific IP's or subnets (local), but they still
managed to get in. After reloading the machine, an entire weekend's
worth of work because the box is specifically configured as web and
email server it was only two days and they'd dropped in another root
kit. fortunately I caught it before they were able to compromise any
of the critical systems and I was able to lock things up real good
and clean up the mess.
What I did next has taught me plenty and also contributed to kicking
my own ass for not taking these steps in the past:
1. changed the port that sshd listens on to a non-standard port. in
my case I changed it to something completely random that isn't
really used for anything else. (check the /etc/services file for
ports that aren't already assigned)
2. the second thing I did was Google locking down the ssh service.
The following web address outlines the steps necessary that I used
successfully to accomplish this. All it amounts to is disabling root
logins to ssh service and the use of passwords to authenticate to an
sshd service. I'm not using keys to authenticate and very lengthy
pass-phrases from both windows and Linux clients.
a.
http://thinkhole.org/wp/2006/10/30/five-steps-to-a-more-secure-ssh
3. while reading through the above howto I saw what looked like just
the ticket for monitoring ssh attacks on my servers. As I read it
made more and more sense, so I went there and read some more. After
I was done reading I grabbed the package and install and configured
it. It's not hard, but it is a little tedious, but works wonderfully.
b.
http://www.howtoforge.com/preventing_ssh_dictionary_attacks_with_denyhosts
Since taking care of these things I've had no more trouble and since
installing DenyHosts I haven't had to spend anywhere the amount of
time making adjustments to my firewall either.
Deny Hosts Information:
----------------------------------
http://denyhosts.sourceforge.net/
--
Mark
"If you have found a very wise man, then you've found
a man that at one time was an idiot and lived long enough
to learn from his own stupidity."
=============================================Powered by CentOS5 (RHEL5)