It was bound to happen - suspected hack
    aaron hirsch 
    aaronh at uptime.net
       
    Thu Oct 21 10:00:28 CDT 2004
    
    
  
I'd modify the hosts.allow file a bit more...
i.e.
sshd: localhost 192.168.0.0/255.255.255.0 12.30.163.*
ALL:ALL:DENY
This is a "catch-all" that is a best practice just incase the hosts.deny
is misconfigured or not configured at all, although the ALL:ALL in your
hosts.deny is correct.  It will deny access to all services that tcpd
monitors to everything as a last resort.  Hence, if it's not explicitly
defined to be allowed, it is by default denied.
Just an idea...
-----Original Message-----
From: Jon Moss [mailto:jon.moss at cnonline.net] 
Sent: Thursday, October 21, 2004 7:03 AM
To: kclug at kclug.org
Subject: Re: It was bound to happen - suspected hack
I've been researching sshd and allowing/denying access and I think I
have
figured it out.  Just please confirm that I'm on the right track.
I edited my hosts.allow as follows:
#
# hosts.allow	This file describes the names of the hosts which are
#		allowed to use the local INET services, as decided
#		by the '/usr/sbin/tcpd' server.
#
sshd: localhost 192.168.0.0/255.255.255.0 12.30.163.*
And then my hosts.deny as follows:
#
# hosts.deny	This file describes the names of the hosts which are
#		*not* allowed to use the local INET services, as decided
#		by the '/usr/sbin/tcpd' server.
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow.  In particular
# you should know that NFS uses portmap!
ALL : ALL
However, I don't really have anyway to test this as I allowed access
from
everywhere that I am.  :)
Any suggestions and advice is still greatly appreciated.
-- 
Thanks very much,
Jon Moss
jon.moss at cnonline.net
_______________________________________________
Kclug mailing list
Kclug at kclug.org
http://kclug.org/mailman/listinfo/kclug
    
    
More information about the Kclug
mailing list