Bruteforce/Dictionary-Attacke blockieren | nur 3 login versuche pro ip

PeterOG

New Member
Hallo,
wie kann ich an meinem vServer einstellen, dass nach 3 fehlerhaften Loginversuchen die IP des Angreifers gesperrt wird oder sonst irgendein Schutzmechanismus?
Meine Passwörter sind zwar recht sicher und die Person wird noch ein paar Jahre brauchen um es zu knacken:rolleyes: aber lästig sind diese Versuche schon.

Kann ich diese Person anzeigen bringt das was? Die IP-Adresse kommt atm aus Indien war aber auch schon Finnland und Holland :D Welche Möglichkeiten hab ich um dem Typen die Hammelbeine lang zu ziehen?

Hier mal ein kleiner Auszug
variante 1 -verschiedene User
Code:
Aug  1 07:38:03 v31183 sshd[26160]: Failed password for invalid user arianna from 82.194.82.185 port 35311 ssh2
Aug  1 07:38:04 v31183 sshd[26335]: Invalid user maya from 82.194.82.185
Aug  1 07:38:06 v31183 sshd[26335]: Failed password for invalid user maya from 82.194.82.185 port 35413 ssh2
Aug  1 07:38:06 v31183 sshd[26406]: Invalid user brooke from 82.194.82.185
Aug  1 07:38:08 v31183 sshd[26406]: Failed password for invalid user brooke from 82.194.82.185 port 35513 ssh2
Aug  1 07:38:08 v31183 sshd[26469]: Invalid user rebecca from 82.194.82.185
Aug  1 07:38:10 v31183 sshd[26469]: Failed password for invalid user rebecca from 82.194.82.185 port 35602 ssh2
Aug  1 07:38:11 v31183 sshd[26522]: Invalid user katie from 82.194.82.185
Aug  1 07:38:12 v31183 sshd[26522]: Failed password for invalid user katie from 82.194.82.185 port 35698 ssh2
Aug  1 07:38:13 v31183 sshd[26562]: Invalid user alexandra from 82.194.82.185
Aug  1 07:38:15 v31183 sshd[26562]: Failed password for invalid user alexandra from 82.194.82.185 port 35785 ssh2
Aug  1 07:38:15 v31183 sshd[27664]: Invalid user jenna from 82.194.82.185
Aug  1 07:38:17 v31183 sshd[27664]: Failed password for invalid user jenna from 82.194.82.185 port 35878 ssh2
Aug  1 07:38:18 v31183 sshd[27732]: Invalid user gabriella from 82.194.82.185
Aug  1 07:38:19 v31183 sshd[27732]: Failed password for invalid user gabriella from 82.194.82.185 port 35975 ssh2
Aug  1 07:38:20 v31183 sshd[27791]: Invalid user bailey from 82.194.82.185
Aug  1 07:38:22 v31183 sshd[27791]: Failed password for invalid user bailey from 82.194.82.185 port 36052 ssh2
Aug  1 07:38:23 v31183 sshd[27877]: Invalid user destiny from 82.194.82.185
Aug  1 07:38:25 v31183 sshd[27877]: Failed password for invalid user destiny from 82.194.82.185 port 36165 ssh2
Aug  1 07:38:25 v31183 sshd[27955]: Invalid user trinity from 82.194.82.185
Aug  1 07:38:27 v31183 sshd[27955]: Failed password for invalid user trinity from 82.194.82.185 port 36249 ssh2
Aug  1 07:38:27 v31183 sshd[28020]: Invalid user avery from 82.194.82.185
Aug  1 07:38:30 v31183 sshd[28020]: Failed password for invalid user avery from 82.194.82.185 port 36342 ssh2
Aug  1 07:38:30 v31183 sshd[28075]: Invalid user caroline from 82.194.82.185
Aug  1 07:38:32 v31183 sshd[28075]: Failed password for invalid user caroline from 82.194.82.185 port 36450 ssh2
Aug  1 07:38:33 v31183 sshd[28157]: Invalid user nicole from 82.194.82.185
Aug  1 07:38:35 v31183 sshd[28157]: Failed password for invalid user nicole from 82.194.82.185 port 36542 ssh2
Aug  1 07:38:36 v31183 sshd[28217]: Invalid user faith from 82.194.82.185
Aug  1 07:38:38 v31183 sshd[28217]: Failed password for invalid user faith from 82.194.82.185 port 36642 ssh2
Aug  1 07:38:38 v31183 sshd[28285]: Invalid user erin from 82.194.82.185
Aug  1 07:38:41 v31183 sshd[28285]: Failed password for invalid user erin from 82.194.82.185 port 36734 ssh2
Aug  1 07:38:41 v31183 sshd[28346]: Invalid user amanda from 82.194.82.185
Aug  1 07:38:42 v31183 sshd[28346]: Failed password for invalid user amanda from 82.194.82.185 port 36830 ssh2
Aug  1 07:38:43 v31183 sshd[28394]: Invalid user gabrielle from 82.194.82.185
Aug  1 07:38:45 v31183 sshd[28394]: Failed password for invalid user gabrielle from 82.194.82.185 port 36898 ssh2
Aug  1 07:38:45 v31183 sshd[28444]: Invalid user audrey from 82.194.82.185
Aug  1 07:38:48 v31183 sshd[28444]: Failed password for invalid user audrey from 82.194.82.185 port 36979 ssh2
Aug  1 07:38:48 v31183 sshd[28500]: Invalid user molly from 82.194.82.185
Aug  1 07:38:50 v31183 sshd[28500]: Failed password for invalid user molly from 82.194.82.185 port 37071 ssh2
Aug  1 07:38:50 v31183 sshd[28559]: Invalid user sophie from 82.194.82.185
Aug  1 07:38:53 v31183 sshd[28559]: Failed password for invalid user sophie from 82.194.82.185 port 37158 ssh2
Aug  1 07:38:53 v31183 sshd[28629]: Invalid user alexa from 82.194.82.185
Aug  1 07:38:54 v31183 sshd[28629]: Failed password for invalid user alexa from 82.194.82.185 port 37257 ssh2
Aug  1 07:38:55 v31183 sshd[29706]: Invalid user claire from 82.194.82.185
Aug  1 07:38:57 v31183 sshd[29706]: Failed password for invalid user claire from 82.194.82.185 port 37324 ssh2
Aug  1 07:38:58 v31183 sshd[29772]: Invalid user aaliyah from 82.194.82.185
Aug  1 07:39:00 v31183 sshd[29772]: Failed password for invalid user aaliyah from 82.194.82.185 port 37411 ssh2
Aug  1 07:39:00 v31183 sshd[29887]: Invalid user leah from 82.194.82.185
Aug  1 07:39:02 v31183 sshd[29887]: Failed password for invalid user leah from 82.194.82.185 port 37497 ssh2
Aug  1 07:39:03 v31183 sshd[30160]: Invalid user kate from 82.194.82.185
Aug  1 07:39:04 v31183 sshd[30160]: Failed password for invalid user kate from 82.194.82.185 port 37582 ssh2
Aug  1 07:39:05 v31183 sshd[30225]: Invalid user skylar from 82.194.82.185
Aug  1 07:39:06 v31183 sshd[30225]: Failed password for invalid user skylar from 82.194.82.185 port 37664 ssh2
Aug  1 07:39:06 v31183 sshd[30266]: Invalid user mckenna from 82.194.82.185
Aug  1 07:39:08 v31183 sshd[30266]: Failed password for invalid user mckenna from 82.194.82.185 port 37720 ssh2
Aug  1 07:39:09 v31183 sshd[30320]: Invalid user kennedy from 82.194.82.185
Aug  1 07:39:11 v31183 sshd[30320]: Failed password for invalid user kennedy from 82.194.82.185 port 37794 ssh2
Aug  1 07:39:12 v31183 sshd[30390]: Invalid user peyton from 82.194.82.185
Aug  1 07:39:14 v31183 sshd[30390]: Failed password for invalid user peyton from 82.194.82.185 port 37898 ssh2
Aug  1 07:39:14 v31183 sshd[30440]: Invalid user lindsey from 82.194.82.185
Aug  1 07:39:16 v31183 sshd[30440]: Failed password for invalid user lindsey from 82.194.82.185 port 37972 ssh2
Aug  1 07:39:16 v31183 sshd[30495]: Invalid user ashlyn from 82.194.82.185
Aug  1 07:39:18 v31183 sshd[30495]: Failed password for invalid user ashlyn from 82.194.82.185 port 38053 ssh2
Aug  1 07:39:18 v31183 sshd[30550]: Invalid user carly from 82.194.82.185
Aug  1 07:39:21 v31183 sshd[30550]: Failed password for invalid user carly from 82.194.82.185 port 38132 ssh2
Aug  1 07:39:21 v31183 sshd[30616]: Invalid user marissa from 82.194.82.185
Aug  1 07:39:24 v31183 sshd[30616]: Failed password for invalid user marissa from 82.194.82.185 port 38211 ssh2
Aug  1 07:39:24 v31183 sshd[30683]: Invalid user gracie from 82.194.82.185
Aug  1 07:39:26 v31183 sshd[30683]: Failed password for invalid user gracie from 82.194.82.185 port 38297 ssh2
Aug  1 07:39:26 v31183 sshd[31769]: Invalid user sierra from 82.194.82.185
Aug  1 07:39:28 v31183 sshd[31769]: Failed password for invalid user sierra from 82.194.82.185 port 38365 ssh2
Aug  1 07:39:28 v31183 sshd[31856]: Invalid user lillian from 82.194.82.185
Aug  1 07:39:30 v31183 sshd[31856]: Failed password for invalid user lillian from 82.194.82.185 port 38437 ssh2
Aug  1 07:39:30 v31183 sshd[31908]: Invalid user jillian from 82.194.82.185
Aug  1 07:39:33 v31183 sshd[31908]: Failed password for invalid user jillian from 82.194.82.185 port 38507 ssh2
Aug  1 07:39:33 v31183 sshd[31967]: Invalid user reagan from 82.194.82.185
Aug  1 07:39:36 v31183 sshd[31967]: Failed password for invalid user reagan from 82.194.82.185 port 38587 ssh2
Aug  1 07:39:36 v31183 sshd[32025]: Invalid user shelby from 82.194.82.185
Aug  1 07:39:37 v31183 sshd[32025]: Failed password for invalid user shelby from 82.194.82.185 port 38670 ssh2
Aug  1 07:39:38 v31183 sshd[32082]: Invalid user amelia from 82.194.82.185
Aug  1 07:39:40 v31183 sshd[32082]: Failed password for invalid user amelia from 82.194.82.185 port 38738 ssh2
Aug  1 07:39:40 v31183 sshd[32133]: Invalid user jada from 82.194.82.185
Aug  1 07:39:42 v31183 sshd[32133]: Failed password for invalid user jada from 82.194.82.185 port 38814 ssh2
Aug  1 07:39:43 v31183 sshd[32206]: Invalid user kendall from 82.194.82.185
Aug  1 07:39:45 v31183 sshd[32206]: Failed password for invalid user kendall from 82.194.82.185 port 38897 ssh2
Aug  1 07:39:45 v31183 sshd[32286]: Invalid user courtney from 82.194.82.185
Aug  1 07:39:48 v31183 sshd[32286]: Failed password for invalid user courtney from 82.194.82.185 port 38974 ssh2
Aug  1 07:39:48 v31183 sshd[32348]: Invalid user brooklyn from 82.194.82.185
Aug  1 07:39:50 v31183 sshd[32348]: Failed password for invalid user brooklyn from 82.194.82.185 port 39045 ssh2
Aug  1 07:39:50 v31183 sshd[32394]: Invalid user autumn from 82.194.82.185
Aug  1 07:39:52 v31183 sshd[32394]: Failed password for invalid user autumn from 82.194.82.185 port 39110 ssh2
Aug  1 07:39:52 v31183 sshd[32451]: Invalid user mary from 82.194.82.185
Aug  1 07:39:55 v31183 sshd[32451]: Failed password for invalid user mary from 82.194.82.185 port 39176 ssh2
Aug  1 07:39:55 v31183 sshd[32509]: Invalid user amber from 82.194.82.185
Aug  1 07:39:57 v31183 sshd[32509]: Failed password for invalid user amber from 82.194.82.185 port 39259 ssh2
Aug  1 07:39:57 v31183 sshd[32565]: Invalid user maggie from 82.194.82.185
Aug  1 07:39:59 v31183 sshd[32565]: Failed password for invalid user maggie from 82.194.82.185 port 39330 ssh2
Aug  1 07:40:00 v31183 sshd[32612]: Invalid user danielle from 82.194.82.185
Aug  1 07:40:02 v31183 sshd[32612]: Failed password for invalid user danielle from 82.194.82.185 port 39399 ssh2
Aug  1 07:40:02 v31183 sshd[1404]: Invalid user ben from 82.194.82.185
Aug  1 07:40:04 v31183 sshd[1404]: Failed password for invalid user ben from 82.194.82.185 port 39463 ssh2
Aug  1 07:40:04 v31183 sshd[1598]: Invalid user jacob from 82.194.82.185
Aug  1 07:40:06 v31183 sshd[1598]: Failed password for invalid user jacob from 82.194.82.185 port 39527 ssh2
Aug  1 07:40:07 v31183 sshd[1657]: Invalid user aidan from 82.194.82.185
Aug  1 07:40:09 v31183 sshd[1657]: Failed password for invalid user aidan from 82.194.82.185 port 39598 ssh2
Aug  1 07:40:09 v31183 sshd[1705]: Invalid user ethan from 82.194.82.185
Aug  1 07:40:11 v31183 sshd[1705]: Failed password for invalid user ethan from 82.194.82.185 port 39675 ssh2
Aug  1 07:40:12 v31183 sshd[1746]: Invalid user matthew from 82.194.82.185
Aug  1 07:40:13 v31183 sshd[1746]: Failed password for invalid user matthew from 82.194.82.185 port 39743 ssh2
Aug  1 07:40:14 v31183 sshd[1790]: Invalid user nicholas from 82.194.82.185
Aug  1 07:40:16 v31183 sshd[1790]: Failed password for invalid user nicholas from 82.194.82.185 port 39806 ssh2
Aug  1 07:40:16 v31183 sshd[1827]: Invalid user joshua from 82.194.82.185
Aug  1 07:40:18 v31183 sshd[1827]: Failed password for invalid user joshua from 82.194.82.185 port 39872 ssh2
Aug  1 07:40:18 v31183 sshd[1863]: Invalid user ryan from 82.194.82.185
Aug  1 07:40:20 v31183 sshd[1863]: Failed password for invalid user ryan from 82.194.82.185 port 39938 ssh2
Aug  1 07:40:20 v31183 sshd[1909]: Invalid user michael from 82.194.82.185
Aug  1 07:40:22 v31183 sshd[1909]: Failed password for invalid user michael from 82.194.82.185 port 40000 ssh2
Aug  1 07:40:23 v31183 sshd[1953]: Invalid user zachary from 82.194.82.185
Aug  1 07:40:24 v31183 sshd[1953]: Failed password for invalid user zachary from 82.194.82.185 port 40067 ssh2
Aug  1 07:40:25 v31183 sshd[1978]: Invalid user tyler from 82.194.82.185
Aug  1 07:40:26 v31183 sshd[1978]: Failed password for invalid user tyler from 82.194.82.185 port 40109 ssh2
Aug  1 07:40:27 v31183 sshd[2022]: Invalid user dylan from 82.194.82.185
Aug  1 07:40:29 v31183 sshd[2022]: Failed password for invalid user dylan from 82.194.82.185 port 40160 ssh2
Aug  1 07:40:29 v31183 sshd[3091]: Invalid user andrew from 82.194.82.185
Aug  1 07:40:31 v31183 sshd[3091]: Failed password for invalid user andrew from 82.194.82.185 port 40224 ssh2
Aug  1 07:40:31 v31183 sshd[3129]: Invalid user connor from 82.194.82.185
Aug  1 07:40:33 v31183 sshd[3129]: Failed password for invalid user connor from 82.194.82.185 port 40290 ssh2
Aug  1 07:40:34 v31183 sshd[3235]: Invalid user jack from 82.194.82.185
Aug  1 07:40:36 v31183 sshd[3235]: Failed password for invalid user jack from 82.194.82.185 port 40362 ssh2
Aug  1 07:40:37 v31183 sshd[3275]: Invalid user christopher from 82.194.82.185
Aug  1 07:40:38 v31183 sshd[3275]: Failed password for invalid user christopher from 82.194.82.185 port 40428 ssh2
Aug  1 07:40:39 v31183 sshd[3318]: Invalid user caleb from 82.194.82.185
Aug  1 07:40:40 v31183 sshd[3318]: Failed password for invalid user caleb from 82.194.82.185 port 40487 ssh2
Aug  1 07:40:41 v31183 sshd[3349]: Invalid user alexander from 82.194.82.185
Aug  1 07:40:42 v31183 sshd[3349]: Failed password for invalid user alexander from 82.194.82.185 port 40539 ssh2
Aug  1 07:40:43 v31183 sshd[3394]: Invalid user logan from 82.194.82.185
Aug  1 07:40:45 v31183 sshd[3394]: Failed password for invalid user logan from 82.194.82.185 port 40602 ssh2
Aug  1 07:40:45 v31183 sshd[3430]: Invalid user jayden from 82.194.82.185
Aug  1 07:40:47 v31183 sshd[3430]: Failed password for invalid user jayden from 82.194.82.185 port 40668 ssh2
Aug  1 07:40:48 v31183 sshd[3468]: Invalid user nathan from 82.194.82.185
Aug  1 07:40:49 v31183 sshd[3468]: Failed password for invalid user nathan from 82.194.82.185 port 40737 ssh2
Aug  1 07:40:49 v31183 sshd[3507]: Invalid user noah from 82.194.82.185
Aug  1 07:40:51 v31183 sshd[3507]: Failed password for invalid user noah from 82.194.82.185 port 40790 ssh2
Aug  1 07:40:51 v31183 sshd[3544]: Invalid user joseph from 82.194.82.185
Aug  1 07:40:53 v31183 sshd[3544]: Failed password for invalid user joseph from 82.194.82.185 port 40853 ssh2
Aug  1 07:40:53 v31183 sshd[3584]: Invalid user benjamin from 82.194.82.185
Aug  1 07:40:55 v31183 sshd[3584]: Failed password for invalid user benjamin from 82.194.82.185 port 40917 ssh2
Aug  1 07:40:56 v31183 sshd[3628]: Invalid user daniel from 82.194.82.185
Aug  1 07:40:58 v31183 sshd[3628]: Failed password for invalid user daniel from 82.194.82.185 port 40985 ssh2
Aug  1 07:40:58 v31183 sshd[3675]: Invalid user william from 82.194.82.185
Aug  1 07:41:00 v31183 sshd[3675]: Failed password for invalid user william from 82.194.82.185 port 41050 ssh2
Aug  1 07:41:00 v31183 sshd[3714]: Invalid user anthony from 82.194.82.185
Aug  1 07:41:02 v31183 sshd[3714]: Failed password for invalid user anthony from 82.194.82.185 port 41111 ssh2
Aug  1 07:41:02 v31183 sshd[3873]: Invalid user cameron from 82.194.82.185
Aug  1 07:41:04 v31183 sshd[3873]: Failed password for invalid user cameron from 82.194.82.185 port 41166 ssh2
Aug  1 07:41:05 v31183 sshd[3918]: Invalid user james from 82.194.82.185
Aug  1 07:41:07 v31183 sshd[3918]: Failed password for invalid user james from 82.194.82.185 port 41231 ssh2
Aug  1 07:41:07 v31183 sshd[3950]: Invalid user austin from 82.194.82.185
Aug  1 07:41:09 v31183 sshd[3950]: Failed password for invalid user austin from 82.194.82.185 port 41283 ssh2
Aug  1 07:41:09 v31183 sshd[3987]: Invalid user jackson from 82.194.82.185
Aug  1 07:41:11 v31183 sshd[3987]: Failed password for invalid user jackson from 82.194.82.185 port 41349 ssh2
Aug  1 07:41:12 v31183 sshd[4033]: Invalid user justin from 82.194.82.185
Aug  1 07:41:13 v31183 sshd[4033]: Failed password for invalid user justin from 82.194.82.185 port 41414 ssh2
Aug  1 07:41:13 v31183 sshd[4068]: Invalid user brandon from 82.194.82.185
Aug  1 07:41:15 v31183 sshd[4068]: Failed password for invalid user brandon from 82.194.82.185 port 41465 ssh2
Aug  1 07:41:16 v31183 sshd[5137]: Invalid user john from 82.194.82.185
Aug  1 07:41:18 v31183 sshd[5137]: Failed password for invalid user john from 82.194.82.185 port 41533 ssh2
variante2 root account
Code:
Jul 21 01:04:14 v31183 sshd[26183]: Failed password for root from 85.92.145.101 port 51059 ssh2
Jul 21 01:04:15 v31183 sshd[26440]: Address 85.92.145.101 maps to gameserver001.jcegns.nl, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
Jul 21 01:04:18 v31183 sshd[26440]: Failed password for root from 85.92.145.101 port 51372 ssh2
Jul 21 01:04:18 v31183 sshd[27752]: Address 85.92.145.101 maps to gameserver001.jcegns.nl, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
Jul 21 01:04:21 v31183 sshd[27752]: Failed password for root from 85.92.145.101 port 51826 ssh2
Jul 21 01:04:22 v31183 sshd[28005]: Address 85.92.145.101 maps to gameserver001.jcegns.nl, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
Jul 21 01:04:25 v31183 sshd[28005]: Failed password for root from 85.92.145.101 port 52274 ssh2
Jul 21 01:04:25 v31183 sshd[28175]: Address 85.92.145.101 maps to gameserver001.jcegns.nl, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!
Jul 21 01:04:28 v31183 sshd[28175]: Failed password for root from 85.92.145.101 port 52782 ssh2
Jul 21 01:04:28 v31183 sshd[28303]: Address 85.92.145.101 maps to gameserver001.jcegns.nl, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT!

neuerdings wird es schon gar nicht mehr als "POSSIBLE BREAKIN ATTEMPT!" markiert
Code:
Aug  1 09:30:26 v31183 sshd[13872]: Failed password for root from 131.178.5.42 port 44274 ssh2
Aug  1 09:30:29 v31183 sshd[14011]: Failed password for root from 131.178.5.42 port 44750 ssh2
Aug  1 09:30:34 v31183 sshd[14120]: Failed password for root from 131.178.5.42 port 45213 ssh2
Aug  1 09:30:37 v31183 sshd[14242]: Failed password for root from 131.178.5.42 port 45688 ssh2
Aug  1 09:30:42 v31183 sshd[15395]: Failed password for root from 131.178.5.42 port 46176 ssh2
Aug  1 09:30:46 v31183 sshd[15537]: Failed password for root from 131.178.5.42 port 46680 ssh2
Aug  1 09:30:49 v31183 sshd[15649]: Failed password for root from 131.178.5.42 port 47159 ssh2
Aug  1 09:30:54 v31183 sshd[15778]: Failed password for root from 131.178.5.42 port 47623 ssh2
Aug  1 09:30:59 v31183 sshd[15915]: Failed password for root from 131.178.5.42 port 48179 ssh2

Welche Motivation steckt hinter solchen Personen sind das Schulkinder die in ihren Ferien nichts zu tun haben?

Hoffe jemand kann mir weiterhelfen.
Gruß Peter
 
fail2ban ist ganz gut - setzt allerdings iptable Handlung voraus, was auf nem vServer ja nicht so selbstverständlich ist.

Du kannst dir die Mühe machen und die entsprechenden Anbieter zu denen die IPs gehören abusen - mittels Whois findest du die zugehörigen Emailadressen der Abuseabteilungen. Bringt dir aber persönlich auch nichts. Ist halt einfach so. Als recht einfache Lösung kann man z.B. den SSH-Port verlegen, damit hält man sich schon mal das meiste vom Leib.
 
danke fail2ban scheint ja schonmal das richtige zu sein :) mit den iptable Handlungen hab ich nicht so ganz verstanden, dass soll ja auch fail2ban machen =)

das mit dem ssh port verlegen frag ich mich ob das sinvoll ist, es wird ja eh durchprobiert
Code:
Failed password for invalid user carly from 82.194.82.185 port [B]38132 [/B]ssh2
Aug  1 07:39:21 v31183 sshd[30616]: Invalid user marissa from 82.194.82.185
Aug  1 07:39:24 v31183 sshd[30616]: Failed password for invalid user marissa from 82.194.82.185 port [B]38211[/B] ssh2

und whois... sind ja immer wieder andere mal aus indien finnland oder holland usw. die whois führen mich dann zu irgendwelchen Telefongesellschaften z.B. beim letzten
Code:
Using 11 day old cached answer (or, you can get fresh results).
Hiding E-mail address (you can get results with the E-mail address).

% [whois.apnic.net node-2]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

inetnum:      203.200.0.0 - 203.200.255.255
netname:      VSNL-IN
descr:        Videsh Sanchar Nigam Ltd - India.
descr:        Videsh Sanchar Bhawan, M.G. Road
descr:        Fort, Bombay 400001
country:      IN
admin-c:      IA15-AP
tech-c:       VT43-AP
remarks:      -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks:      This object can only be modified by APNIC hostmaster
remarks:      If you wish to modify this object details please
remarks:      send email to **********@apnic.net with your organisation
remarks:      account name in the subject line.
remarks:      -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
mnt-by:       APNIC-HM
mnt-lower:    MAINT-VSNL-AP
mnt-routes:   MAINT-VSNL-AP
changed:      **********@apnic.net 20040318
status:       ALLOCATED PORTABLE
changed:      **********@apnic.net 20040319
source:       APNIC

person:       IP Administrator
nic-hdl:      IA15-AP
e-mail:       ********@vsnl.co.in
address:      6th Floor, LVSB, VSNL
address:      Kashinath Dhuru marg, Prabhadevi
address:      Dadar(W), Mumbai 400028
address:      India
phone:        +91-22-56633503
fax-no:       +91-22-24320132
country:      IN
mnt-by:       MAINT-VSNL-AP
changed:      **********@apnic.net 20070223
source:       APNIC

person:       VSNL Tech
nic-hdl:      VT43-AP
e-mail:       *******@vsnl.co.in
address:      6th Floor, LVSB, VSNL
address:      Kashinath Dhuru marg, Prabhadevi
address:      Dadar(W), Mumbai 400028
address:      India
phone:        +91-22-56633503
fax-no:       +91-22-24320132
country:      IN
mnt-by:       MAINT-VSNL-AP
changed:      **********@apnic.net 20070223
source:       APNIC

Das kostet ja nur Zeit wenn ich da hinterher bin und die abuse abteilungen anschreibe.
 
Ich habe auch gute Erfahrungen mit "denyhosts" gemacht.
Aber im Endeffekt ist es ja doch nur Kosmetik für die Logfiles.
 
das mit dem ssh port verlegen frag ich mich ob das sinvoll ist, es wird ja eh durchprobiert
nö, was Du da siehst ist der abgehende Port des ssh-Clients, der natürlich jedesmal anders ist. Wenn Du den Port von Deinem sshd auf irgendwas > 1024 legst, sollte weitestgehend Ruhe herrschen (den musst Du Dir dann natürlich gut merken:) ), ganz ohne dynamisch angepasste iptables.

LinuxAdmin
 
Irgendwie habe ich Probleme meinen Port zu verlegen.
Habe in /etc/ssh
vi sshd_config ausgeführt den port umgestellt und gespeichert. Erneutes öffnen bestätigt mir auch die Änderung.
Wenn ich jetz in /etc/init.d
ssh reload oder ssh restart eingebe kommt folgene Meldung
Code:
ssh: connect to host reload port 22: No route to host
ssh: connect to host restart port 22: No route to host
achja /etc/init.d sshd restart geht irgendwie nicht
bei sshd kommt sshd re-exec requires execution with an absolute path
 
Last edited by a moderator:
Du sollst auch
Code:
/etc/init.d/ssh
restart eingeben und nicht einfach
Code:
ssh
Dies hat nämlich zur Folge, dass Du auf dem Server einen Client startest, der zum Host "reload", respektive "restart" connecten soll, was natürlich nicht klappt.
 
Also hab jetzt /etc/init.d/sshd restart eingegeben.
/etc/init.d/ssh restart geht nicht
Code:
/etc/init.d/sshd restart
Shutting down SSH daemon                                              done
Starting SSH daemon                                                   done

Code:
/etc/init.d/ssh restart
~: command not found

meine /etc/ssh/sshd_config hat port 1137 gespeichert. Trotzdem kann ich noch unter port 22 connecten. Habe einen vServer mit Suse 10.0

sshd_config:
Code:
# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes

# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no

# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes

# Set this to 'yes' to enable support for the deprecated 'gssapi' authentication
# mechanism to OpenSSH 3.8p1. The newer 'gssapi-with-mic' mechanism is included
# in this release. The use of 'gssapi' is deprecated due to the presence of
# potential man-in-the-middle attacks, which 'gssapi-with-mic' is not susceptible to.
#GSSAPIEnableMITMAttack no


# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication mechanism.
# Depending on your PAM configuration, this may bypass the setting of
# PasswordAuthentication, PermitEmptyPasswords, and
# "PermitRootLogin without-password". If you just want the PAM account and
# session checks to run without PAM authentication, then enable this but set
# ChallengeResponseAuthentication=no
UsePAM yes

#AllowTcpForwarding yes
#GatewayPorts no
X11Forwarding no
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression yes
#ClientAliveInterval 0
#ClientAliveCountMax 3
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10

# no default banner path
#Banner /some/path

# override default of no subsystems
Subsystem       sftp    /usr/lib64/ssh/sftp-server

# This enables accepting locale enviroment variables LC_* LANG, see sshd_config(5).
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL

Hat vielleicht noch jemand ein Tip warum port 22 noch aktiv ist? unter 1137 wird die connection refused :mad:
 
Also hab jetzt /etc/init.d/sshd restart eingegeben.

gut, das war richtig.

meine /etc/ssh/sshd_config hat port 1137 gespeichert. Trotzdem kann ich noch unter port 22 connecten.

Glaub ich nicht :p Wenn wirklich Port 1137 dort drin stehen würde, würde der sshd sich nach dem restart nicht mehr auf Port 22 melden, sondern auf 1137. Leider fehlt bei dem von Dir angegebenen config-file die obere Hälfte...

Vielleicht nimmt der sshd ja auch ein ganz anderes config-file (was ich bei einer Standardinstallation aber sehr stark bezweifele...). Was bringt denn folgender Test (als root):
Code:
/usr/sbin/sshd -eddd
Falls der Test nicht mit einem Fehler abbricht, solltest Du Dich tatsächlich einmalig auf Port 1137 einloggen können.

LinuxAdmin
 
Der Test sagt mir auch 22 aber die config ist ja am richtigen Ort komisch
Code:
debug2: load_server_config: filename /etc/ssh/sshd_config
debug2: load_server_config: done config len = 389
debug2: parse_server_config: config /etc/ssh/sshd_config len 389
debug1: sshd version OpenSSH_4.1p1
debug1: private host key: #0 type 0 RSA1
debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: rexec_argv[0]='/usr/sbin/sshd'
debug1: rexec_argv[1]='-eddd'
debug2: fd 3 setting O_NONBLOCK
debug1: Bind to port 22 on 0.0.0.0.
Bind to port 22 on 0.0.0.0 failed: Address already in use.
socket: Address family not supported by protocol
Cannot bind any address.

nochmal die cfg komplett
Code:
#       $OpenBSD: sshd_config,v 1.70 2004/12/23 23:11:00 djm Exp $

# This is the sshd server system-wide configuration file.  See
# sshd_config(5) for more information.

# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin

# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented.  Uncommented options change a
# default value.

#Port 1137
#Protocol 2,1
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::

# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key

# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 768

# Logging
#obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
#LogLevel INFO

# Authentication:

#LoginGraceTime 2m
#PermitRootLogin yes
#StrictModes yes
#MaxAuthTries 6

#RSAAuthentication yes
#PubkeyAuthentication yes
#AuthorizedKeysFile     .ssh/authorized_keys

# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#RhostsRSAAuthentication no
# similar for protocol version 2
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# RhostsRSAAuthentication and HostbasedAuthentication
#IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes

# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes
#PermitEmptyPasswords no

# Change to no to disable s/key passwords
#ChallengeResponseAuthentication yes

# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no

# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes

# Set this to 'yes' to enable support for the deprecated 'gssapi' authentication
# mechanism to OpenSSH 3.8p1. The newer 'gssapi-with-mic' mechanism is included
# in this release. The use of 'gssapi' is deprecated due to the presence of
# potential man-in-the-middle attacks, which 'gssapi-with-mic' is not susceptible to.
#GSSAPIEnableMITMAttack no


# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication mechanism.
# Depending on your PAM configuration, this may bypass the setting of
# PasswordAuthentication, PermitEmptyPasswords, and
# "PermitRootLogin without-password". If you just want the PAM account and
# session checks to run without PAM authentication, then enable this but set
# ChallengeResponseAuthentication=no
UsePAM yes

#AllowTcpForwarding yes
#GatewayPorts no
X11Forwarding no
#X11DisplayOffset 10
#X11UseLocalhost yes
#PrintMotd yes
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#PermitUserEnvironment no
#Compression yes
#ClientAliveInterval 0
#ClientAliveCountMax 3
#UseDNS yes
#PidFile /var/run/sshd.pid
#MaxStartups 10

# no default banner path
#Banner /some/path

# override default of no subsystems
Subsystem       sftp    /usr/lib64/ssh/sftp-server

# This enables accepting locale enviroment variables LC_* LANG, see sshd_config(5).
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL

ist irgendwie trotzdem 22 und nicht 1137 :/
 
Wenn du die Config genau so live hast wundert mich das auch nicht :)

Eine Zeile mit # ist ein Kommentar, d.h. quasi keine deiner Anweisungen wird auch wirklich ausgeführt. Lösch mal das # vor dem "Port ..." und starte SSH neu (aber denk an FW vorher ;-)).
 
Lösch mal das # vor dem "Port ..."

Und wenn er gerade bei Editieren ist, kann er ja auch gleich
Code:
Protocol 2
PermitRootLogin no
mit reinhacken, damit das ganze etwas sicherer wird (sofern er einen nicht-root-account hat, von dem ein su möglich ist...).
 
danke an alle hab den port jetzt verlegt.

Code:
PermitRootLogin no
...(sofern er einen nicht-root-account hat, von dem ein su möglich ist...).
also mit root kann man sich dann nicht mehr einloggen aber ich kann mich dann mit userxy anmelden und dann per su root werden oder wie kann ich das verstehen?
 
Back
Top