Hi everyone,
I've been experiencing failed login attempts over SSH for a long time. Massive amounts of these in my /var/log/secure (which, btw, should be accessible from DA, shouldn't it?):
It seems to be trying common first names, but also standard logins (root, apache, ftp..). The IP switches after a couple of hundred attempts.
Now I decided to harden the server a bit by changing sshd_config. I switched to RSA key authentication-only, and disallowed root login. I limited ssh access to one user only (which i gave sudo permission), by specifying AllowUser: User in sshd_config.
Would you suggest anything else on top of that, or am I on the save side here? I found this incredibly complex script that blocks IPs for a couple of minutes after a custom number of failed login attempts: http://blinkeye.ch/mediawiki/index.php/SSH_Blocking
but it seemed like a pain to set up for the beginner. Are there any easy alternatives?
I've been experiencing failed login attempts over SSH for a long time. Massive amounts of these in my /var/log/secure (which, btw, should be accessible from DA, shouldn't it?):
Dec 3 21:56:53 host sshd[20136]: input_userauth_request: invalid user sydney
Dec 3 16:56:55 host sshd[20134]: Failed password for invalid user sydney from ::ffff:65.254.49.98 port 32989 ssh2
Dec 3 21:56:55 host sshd[20136]: Failed password for invalid user sydney from ::ffff:65.254.49.98 port 32989 ssh2
Dec 3 21:56:55 host sshd[20136]: Received disconnect from ::ffff:65.254.49.98: 11: Bye Bye
Dec 3 22:14:11 host sshd[31901]: input_userauth_request: invalid user colin
Dec 3 22:14:13 host sshd[31901]: Failed password for invalid user colin from ::ffff:65.254.49.98 port 56097 ssh2
Dec 3 17:14:13 host sshd[31899]: Failed password for invalid user colin from ::ffff:65.254.49.98 port 56097 ssh2
Dec 3 22:14:13 host sshd[31901]: Received disconnect from ::ffff:65.254.49.98: 11: Bye Bye
It seems to be trying common first names, but also standard logins (root, apache, ftp..). The IP switches after a couple of hundred attempts.
Now I decided to harden the server a bit by changing sshd_config. I switched to RSA key authentication-only, and disallowed root login. I limited ssh access to one user only (which i gave sudo permission), by specifying AllowUser: User in sshd_config.
Would you suggest anything else on top of that, or am I on the save side here? I found this incredibly complex script that blocks IPs for a couple of minutes after a custom number of failed login attempts: http://blinkeye.ch/mediawiki/index.php/SSH_Blocking
but it seemed like a pain to set up for the beginner. Are there any easy alternatives?