On Tue, Aug 21, 2012 at 01:39:42PM +0800, lina wrote:
> I felt I made some mistakes before, like put the public keys from those
> servers into my own laptop, just for the convinence of connection.
> I am on my way correcting my mistakes.
Public keys are meant to be public, its the secret/private k
On Tuesday 21 August 2012 08:09:22 lina wrote:
> On Tuesday 21,August,2012 07:48 PM, Eike Lantzsch wrote:
> > On Monday 20 August 2012 09:59:47 lina wrote:
> >> Hi,
> >>
> >> I ssh to a server which has 400+ users, active ones around 100.
> >>
> >> Frankly speaking, I would feel comfortable to hi
On Tuesday 21,August,2012 07:48 PM, Eike Lantzsch wrote:
> On Monday 20 August 2012 09:59:47 lina wrote:
>> Hi,
>>
>> I ssh to a server which has 400+ users, active ones around 100.
>>
>> Frankly speaking, I would feel comfortable to hide my IP if possible,
>>
>> any suggestions (I checked the spoo
On Monday 20 August 2012 09:59:47 lina wrote:
> Hi,
>
> I ssh to a server which has 400+ users, active ones around 100.
>
> Frankly speaking, I would feel comfortable to hide my IP if possible,
>
> any suggestions (I checked the spoof, but seems not positive),
>
> Thanks with best regards,
Hi
On 8/21/12 8:20 AM, lina wrote:
> On Tuesday 21,August,2012 02:52 AM, Joe wrote:
>> On Mon, 20 Aug 2012 23:56:42 +0800
>> lina wrote:
>>
>>> On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
On 20.08.2012 18:38, lina wrote:
>>> How do I know who has this IP address? why s/he didn
On Tuesday 21,August,2012 03:12 AM, unruh wrote:
> Everyone suffers these attacks. They are simply part of a toolset which
> crackers use to try to gain entry into Linux machines. As long as you
> have good passwords do not worry. You will also suffer attacks on
> various Windows ports.
>
> If yo
On Tuesday 21,August,2012 02:52 AM, Joe wrote:
> On Mon, 20 Aug 2012 23:56:42 +0800
> lina wrote:
>
>> On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
>>> On 20.08.2012 18:38, lina wrote:
>> How do I know who has this IP address? why s/he didn't change?
>>
>> You probably d
On Mon, 2012-08-20 at 21:45 +0200, Ralf Mardorf wrote:
> On Mon, 2012-08-20 at 22:22 +0300, Lars Noodén wrote:
> > On 8/20/12 10:18 PM, Ralf Mardorf wrote:> On Mon, 2012-08-20 at 22:08
> > [snip]
> > > I thought using tor was a joke :( or a hint, that too much security at
> > > some point really is
On Mon, 2012-08-20 at 22:22 +0300, Lars Noodén wrote:
> On 8/20/12 10:18 PM, Ralf Mardorf wrote:> On Mon, 2012-08-20 at 22:08
> [snip]
> > I thought using tor was a joke :( or a hint, that too much security at
> > some point really is too much. I don't have much knowledge about the
> > Internet, bu
On 8/20/12 10:18 PM, Ralf Mardorf wrote:> On Mon, 2012-08-20 at 22:08
[snip]
> I thought using tor was a joke :( or a hint, that too much security at
> some point really is too much. I don't have much knowledge about the
> Internet, but I'm sure tor in this case (IMO in any case) is idiotic.
> Sorr
On Mon, 2012-08-20 at 22:08 +0300, Lars Noodén wrote:
> On 8/20/12 7:27 PM, lina wrote:
> > On Monday 20,August,2012 11:15 PM, Lars Noodén wrote:
> >> It looks like it is possible to use Tor as a proxy:
> >>
> >> http://www.howtoforge.com/anonymous-ssh-sessions-with-tor
> >>
> >> If this document i
On 20/08/12, Joe (j...@jretrading.com) wrote:
> On Mon, 20 Aug 2012 23:56:42 +0800
> lina wrote:
> > On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
> ...
> e.g in your INPUT chain, just before the ssh -j ACCEPT command:
>
> iptables -A INPUT -p tcp --dport 22 -j LOG --log-level debug
On 8/20/12 7:27 PM, lina wrote:
> On Monday 20,August,2012 11:15 PM, Lars Noodén wrote:
>> It looks like it is possible to use Tor as a proxy:
>>
>> http://www.howtoforge.com/anonymous-ssh-sessions-with-tor
>>
>> If this document is correct, it is very easy to set up. That would
>> obfuscate the i
On Mon, 20 Aug 2012 23:56:42 +0800
lina wrote:
> On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
> > On 20.08.2012 18:38, lina wrote:
> How do I know who has this IP address? why s/he didn't change?
>
> You probably don't. I don't understand this second question.
> >> Th
Now I read some more mails of this thread.
It's not surprising that everybody connected to the Internet is
attacked. "authentication failure" doesn't lead to a serious issue, but
vice versa it says the attacks were useless. And I'm sure, they will be
useless in the future too.
Lina, perhaps you a
On Monday 20,August,2012 11:15 PM, Lars Noodén wrote:
> It looks like it is possible to use Tor as a proxy:
>
> http://www.howtoforge.com/anonymous-ssh-sessions-with-tor
>
> If this document is correct, it is very easy to set up. That would
> obfuscate the ip number you are connecting from by ad
On Mon, 2012-08-20 at 23:56 +0800, lina wrote:
> On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
> > On 20.08.2012 18:38, lina wrote:
> How do I know who has this IP address? why s/he didn't change?
>
> You probably don't. I don't understand this second question.
> >> The
On Monday 20 August 2012 16:56:42 lina wrote:
> just a bit surprised that it keeps the same
> ip address.
Why?
Lisi
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/2
Le lundi 20 août 2012 à 23:38 +0800, lina a écrit :
> On Monday 20,August,2012 11:35 PM, Mika Suomalainen wrote:
> > On 20.08.2012 18:31, lina wrote:
> >> So I am under regular attacks recently, very gentle attack, only
> >> tried few times each day?
Too few attempts, none succeeded. Something on y
On Monday 20,August,2012 11:45 PM, Mika Suomalainen wrote:
> On 20.08.2012 18:38, lina wrote:
How do I know who has this IP address? why s/he didn't change?
You probably don't. I don't understand this second question.
>> The second question is that for those days, the attacker should
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20.08.2012 18:38, lina wrote:
>>> How do I know who has this IP address? why s/he didn't change?
>>>
>>> You probably don't. I don't understand this second question.
> The second question is that for those days, the attacker should
> think of ren
On Monday 20,August,2012 11:35 PM, Mika Suomalainen wrote:
> On 20.08.2012 18:31, lina wrote:
>> So I am under regular attacks recently, very gentle attack, only
>> tried few times each day?
>
> At least your auth.log says so and it shouldn't lie.
>
>> How do I know who has this IP address? why s
On Monday 20,August,2012 11:33 PM, Mika Suomalainen wrote:
> On 20.08.2012 18:15, lina wrote:
>> BTW, what is the 172.21.48.161, seems in the old auth.log* also has
>> this one.
>
>> # zmore auth.log.2.gz | grep 172.21.48.161 Aug 5 16:05:13 Debian
>> sshd[15369]: Did not receive identification st
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20.08.2012 18:31, lina wrote:
> So I am under regular attacks recently, very gentle attack, only
> tried few times each day?
At least your auth.log says so and it shouldn't lie.
> How do I know who has this IP address? why s/he didn't change?
Y
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20.08.2012 18:15, lina wrote:
> BTW, what is the 172.21.48.161, seems in the old auth.log* also has
> this one.
>
> # zmore auth.log.2.gz | grep 172.21.48.161 Aug 5 16:05:13 Debian
> sshd[15369]: Did not receive identification string from
> 172.
On Monday 20,August,2012 11:21 PM, Darac Marjal wrote:
> On Mon, Aug 20, 2012 at 11:15:55PM +0800, lina wrote:
>> On Monday 20,August,2012 10:44 PM, Mika Suomalainen wrote:
>>> On 20.08.2012 17:02, lina wrote:
On Monday 20,August,2012 09:59 PM, lina wrote:
>> Hi,
>>
>> I ssh to a s
On Mon, Aug 20, 2012 at 11:15:55PM +0800, lina wrote:
> On Monday 20,August,2012 10:44 PM, Mika Suomalainen wrote:
> > On 20.08.2012 17:02, lina wrote:
> >> On Monday 20,August,2012 09:59 PM, lina wrote:
> Hi,
>
> I ssh to a server which has 400+ users, active ones around
> 100.
On Monday 20,August,2012 10:44 PM, Mika Suomalainen wrote:
> On 20.08.2012 17:02, lina wrote:
>> On Monday 20,August,2012 09:59 PM, lina wrote:
Hi,
I ssh to a server which has 400+ users, active ones around
100.
Frankly speaking, I would feel comfortable to hide my IP
It looks like it is possible to use Tor as a proxy:
http://www.howtoforge.com/anonymous-ssh-sessions-with-tor
If this document is correct, it is very easy to set up. That would
obfuscate the ip number you are connecting from by adding a jump in the
middle. The target server would only see that
On Monday 20,August,2012 10:44 PM, Mika Suomalainen wrote:
> On 20.08.2012 17:02, lina wrote:
>> On Monday 20,August,2012 09:59 PM, lina wrote:
Hi,
I ssh to a server which has 400+ users, active ones around
100.
Frankly speaking, I would feel comfortable to hide my IP
On Mon, 2012-08-20 at 16:22 +0200, Gaël DONVAL wrote:
> Le lundi 20 août 2012 à 22:02 +0800, lina a écrit :
> > On Monday 20,August,2012 09:59 PM, lina wrote:
> > > Hi,
> > >
> > > I ssh to a server which has 400+ users, active ones around 100.
> > >
> > > Frankly speaking, I would feel comfortab
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20.08.2012 17:02, lina wrote:
> On Monday 20,August,2012 09:59 PM, lina wrote:
>>> Hi,
>>>
>>> I ssh to a server which has 400+ users, active ones around
>>> 100.
>>>
>>> Frankly speaking, I would feel comfortable to hide my IP if
>>> possible,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20.08.2012 16:59, lina wrote:
>
> I ssh to a server which has 400+ users, active ones around 100.
>
> Frankly speaking, I would feel comfortable to hide my IP if
> possible,
>
> any suggestions (I checked the spoof, but seems not positive),
Tr
On Mon, 20 Aug 2012 21:59:47 +0800, lina wrote:
> I ssh to a server which has 400+ users, active ones around 100.
>
> Frankly speaking, I would feel comfortable to hide my IP if possible,
>
> any suggestions (I checked the spoof, but seems not positive),
You mean to hide your ssh remote connect
Le lundi 20 août 2012 à 22:02 +0800, lina a écrit :
> On Monday 20,August,2012 09:59 PM, lina wrote:
> > Hi,
> >
> > I ssh to a server which has 400+ users, active ones around 100.
> >
> > Frankly speaking, I would feel comfortable to hide my IP if possible,
> >
> > any suggestions (I checked th
On Monday 20,August,2012 09:59 PM, lina wrote:
> Hi,
>
> I ssh to a server which has 400+ users, active ones around 100.
>
> Frankly speaking, I would feel comfortable to hide my IP if possible,
>
> any suggestions (I checked the spoof, but seems not positive),
>
> Thanks with best regards,
>
Hi,
I ssh to a server which has 400+ users, active ones around 100.
Frankly speaking, I would feel comfortable to hide my IP if possible,
any suggestions (I checked the spoof, but seems not positive),
Thanks with best regards,
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
37 matches
Mail list logo