Date: Thu, 01 Jul 2010 10:49:00 -0400 From: Glen Barber <glen.j.barber@gmail.com> To: FreeBSD Mailing List <freebsd-questions@FreeBSD.ORG> Subject: sshd logging with private key authentication Message-ID: <4C2CAADC.4080704@gmail.com>
next in thread | raw e-mail | index | archive | help
Hi, I've been seeing quite a bit of ssh bruteforce attacks which appear to be dictionary-based. That's fine; I have proper measures in place, such as key-only access, bruteforce tables for pf(4), and so on. What caught my interest is if I attempt to log in from a machine where I do not have my key, I see nothing logged about a failed publickey attempt. If I attempt with an invalid username, as expected, I see 'Invalid user foo from ${IP}.' Is this to be expected? If so, I am curious why. Though I realize an attacker may not be able to see that a user is valid or invalid, might we want to know that a valid username is being used in an attack? (Unless, of course, the valid username is 'john'...) Regards, -- Glen Barber
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4C2CAADC.4080704>