[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Chinese Action
I've been seeing a marked increase in sshd attacks from China, on my home
system even.
You might all want to take a look at your /var/log/auth.log or
/var/log/secure and see what kind of action y'all are getting.
The common one seems to be root that they try for, so make sure you have
PermitRootLogin set to no. Other faves are git, admin and other common
system ids. As I have a very static number of users on my system, I used
AllowedUsers in my sshd_config to further lock it down.
And if you like SSH'ing to root for some reason, you can restrict it by
IP, like so:
Match Address 10.*
PermitRootLogin yes
finally I picked up this little iptables snippet online, for those of you
who haven't moved to firewalld yet, for really clamping down on failed
attempts.
iptables -A INPUT -p tcp -m tcp --dport 22 -m state \
--state NEW -m hashlimit --hashlimit 1/hour \
--hashlimit-burst 2 --hashlimit-mode srcip \
--hashlimit-name SSH --hashlimit-htable-expire 60000 \
-j ACCEPT
iptables -A INPUT -p tcp -m tcp --dport 22 \
--tcp-flags SYN,RST,ACK SYN -j DROP
iptables -A INPUT -p tcp -m state \
--state NEW -m tcp --dport 22 -j ACCEPT
h.
-
To unsubscribe, send email to majordomo@luci.org with
"unsubscribe luci-discuss" in the body.