I was poking around my system today and noticed a log that I never knew
existed.

/var/log/pwdfail/*

Much to my surprise, I see all these entries (hundreds) from some 'blankety
blank blank' trying to hack my server!!

daevid pwdfail # cat current 
Sep 17 13:00:25 [sshd(pam_unix)] authentication failure; logname= uid=0
euid=0 tty=ssh ruser= rhost=61.103.229.40 
Sep 17 13:00:27 [sshd] Failed password for invalid user webmaster from
61.103.229.40 port 49431 ssh2
Sep 17 13:00:29 [sshd(pam_unix)] authentication failure; logname= uid=0
euid=0 tty=ssh ruser= rhost=61.103.229.40 
Sep 17 13:00:31 [sshd] Failed password for invalid user oracle from
61.103.229.40 port 49556 ssh2
Sep 17 13:00:33 [sshd(pam_unix)] authentication failure; logname= uid=0
euid=0 tty=ssh ruser= rhost=61.103.229.40 
Sep 17 13:00:35 [sshd] Failed password for mysql from 61.103.229.40 port
49660 ssh2
Sep 17 13:00:37 [sshd(pam_unix)] authentication failure; logname= uid=0
euid=0 tty=ssh ruser= rhost=61.103.229.40  user=root
Sep 17 13:00:39 [sshd] Failed password for root from 61.103.229.40 port
49769 ssh2
Sep 17 13:00:41 [sshd(pam_unix)] authentication failure; logname= uid=0
euid=0 tty=ssh ruser= rhost=61.103.229.40  user=root
Sep 17 13:00:43 [sshd] Failed password for root from 61.103.229.40 port
49879 ssh2

I figure there should be a script someone has written that will parse this
and automatically add these unique IP addresses (sans redundant ones) to my
/etc/shorewall/blacklist

Google for "shorewall pwdfail" doesn't have very many results though, and
the ones there are in german or something.

-- 
gentoo-user@gentoo.org mailing list

Reply via email to