Re: OpenSSH 3.4p1 Trouble on SCO 5.0.5?
- From: "Steve M. Fabac, Jr." <smfabac@xxxxxxx>
- Date: Sun, 23 Mar 2008 13:56:01 -0500
Bill Vermillion wrote:
In article <47E6160C.7080405@xxxxxxx>,
Steve M. Fabac, Jr. <smfabac@xxxxxxx> wrote:
I have a client running SCO 5.0.5 with OpenSSH 3.4p1
Since SSH was installed, we have been getting hits from
people on the Internet scanning port 22.
Normally they give up and go away. However, I have noticed
an unusual number of scans from foreign IP addresses using
valid names on the system (the names below in the block for
a single source IP are the *only* names logged from that
Anybody have any ideas, thoughts or comments on this?
I've seen as high as 10,000 such attemts per day - but these are
on mail and web servers directly connected to a tier 1 backbone
[level 3] in their Orlando colo. They actually switch [not route]
connections across the US so I can see 1 hop from Orlando to
Seattle - that's one reason they carry about 60% of the 'net
But as Nico said in his reply to you, you really shouldn't put SCO
on a directly connected internet.
I neglected to indicate that the machine is behind a firewall and port
22 is forwarded from the public IP address to the LAN IP address of
IMO the ONLY machines that should be do so would be machines
that MUST be connected - eg mail servers and web servers. All
other machines should be behind a firewall.
Ideally 3 NIC cards connected to SWITCHES not hubs, would
have a public access IP, and those sould connect to the second set
[A DMZ area] with such things as your web servers, and the 3rd
NIC would go to your business machines on a totally private network
so nothing from the outside world would ever get through.
It's easy and cheap to set up a separate mail/web server
and keep you important machines hidden. I run on FreeBSD since
swithcing an ISP from SGIs back in 1995 and it can run on a slim
machine and is awfully solid.
If you think you are seeing a lot of attacks, just wait - they get
more numerous as time goes by.
I have taken the steps to change from the default ssh port of 22 to
a high port number and that has stopped the repeated probes for now.
We have discussed this in the past and you have indicated that you have
seen ssh probes on high port numbers. We will cross that bridge if/when
Further tests show that my concerns were unwarranted as ssh 3.4p1
installed on 5.0.5 does not log attempts with unknown user names.
Thus the log only contains *hits* when the dictionary attack matches
an existing user's login name.
S.M. Fabac & Associates