Quoting Kamaraju Kusumanchi <[EMAIL PROTECTED]>:

> Here is what I have done so far
> 1) I have looked in various log files but could not find any
> suspicious activity.
> 

Turns out that I was dictionary attacked (thanks to /var/log/auth.log) via ssh 
port. The intruder was able to gain access to the guest account. I created that 
account to reproduce a bug that I was experiencing in KDE. But forgot to delete 
it later. I do not yet know the extent of the damage and whether hir was able 
to gain root access to this system.

I also discovered that remote logins (via ssh) for root account were enabled on 
this system. Now, I disabled them.

Does anyone have suggestions on tightening up the default sshd_config file? I 
read about disabling password authentication mechanism completely and using 
only the key authorization mechanism. But this is too inconvenient to stick to. 
For example, if I go to a friend's machine, I would like to be able to ssh from 
it, without bothering about transferring keys back and forth. Any other 
suggestions are welcome.

raju


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to