Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 5 Aug 2020 10:59:56 -0600
From:      "@lbutlr" <kremels@kreme.com>
To:        FreeBSD <freebsd-questions@freebsd.org>
Subject:   Re: SSH log lines
Message-ID:  <A75BF381-8BBB-407F-862A-8A3E1AC1A516@kreme.com>
In-Reply-To: <745dc612-d5a4-1e06-89bb-8df5dfbd7e1f@fechner.net>
References:  <09256F5E-469C-402B-94DC-3C07F8AC29ED@kreme.com> <745dc612-d5a4-1e06-89bb-8df5dfbd7e1f@fechner.net>

next in thread | previous in thread | raw e-mail | index | archive | help

On 03 Aug 2020, at 23:22, Matthias Fechner <idefix@fechner.net> wrote:
> Am 03.08.2020 um 21:37 schrieb @lbutlr:
>> When some moon tires to login to an account like root, ssh does n’t log the IP address in the failure line as it does with non-existent users.
>> 
>> sshd[99328] error: PAM: Authentication error for root from vps-94314d13.vps.ovh.ca
>> sshd[99328] Connection closed by authenticating user root 139.99.236.165 port 46226 [preauth]
>> 
>> sshd[7202] Invalid user pi from 2.232.248.6 port 46438
>> 
>> Is there anyway that I can change this so that the IP address appears not eh same line as the Authentication error, it would make my blacklisting these people much easier.
> 
> try fail2ban, it can handle all of this correctly.

Why I am trying to do wis instantly ban any criminals attempting to login to root (and a few other other accounts). Fail2ban will ban repeated attempts (just like sshguard which I am already using).

But it doesn't matter, the sshguard author is looking at adding a feature for this.



-- 
Space Directive 723: Terraformers are expressly forbidden from
	recreating Swindon.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?A75BF381-8BBB-407F-862A-8A3E1AC1A516>