could you help interpret my logs?
randykel at swbell.net
Sun Oct 3 21:58:13 UTC 2004
Alexander Dalloz wrote:
>> Authentication Failures:
>> root (220.127.116.11): 59 Time(s)
>> adm (18.104.22.168): 2 Time(s)
>> apache (22.214.171.124): 1 Time(s)
>> cyrus (126.96.36.199): 1 Time(s)
>> matt (188.8.131.52): 1 Time(s)
>> mysql (184.108.40.206): 1 Time(s)
>> nobody (220.127.116.11): 1 Time(s)
>> operator (18.104.22.168): 1 Time(s)
>Hm, this looks like a strategic attempt. The SSH attacks I know do not
>try accounts like cyrus or apache.
I just had the same attack on one of my servers last night from the same
IP address. It looks like they modified a script to add all these extra
users. He saw "Unknown Account: 40 time(s)" and I saw
Unknown Account: 42 Time(s)
So I am wondering if he has the cyrus and news accounts activated.
I also had an attempt last week that tried to login as root, admin,
test, and guest, then tried unsuccessfully to login as root 3,415 times.
I have the "PermitRootLogin no" set in my /etc/ssh/sshd_config file, so
they should not be able to get in even if they do guess the root password.
>> Sessions Opened:
>> (uid=0) -> julian: 2 Time(s)
>> (uid=0) -> cyrus: 1 Time(s)
>> (uid=0) -> news: 1 Time(s)
>> julian(uid=500) -> root: 1 Time(s)
>>It also looks like the attacker was successful in logging in as cyrus
>>and news. Is this possible? Could this be potentially damaging to my
>>system? Or is this something normal which I am overlooking?
>From what do you conclude that the attacker logged in as cyrus and news?
>I would think it was you as root doing so by running "su - $username".
>(One time su'ing from julian to root.) The logwatch entries point to su
>actions. If it wasn't you, then switch off the machine from net, as a
>foreign person has root control over the host.
He could look in the /var/log/secure(.X) file and see if there was a
successful login as cyrus and/or news, and also look at when the login
occurred. He could also look at the /etc/shadow file to see if the cyrus
and news accounts are disabled. The hacker could have covered his tracks
by editing the /var/log/secure file, but it's doubtful since he did not
edit out the unsuccessful attempts. Like Alexander said, it looks like
someone was logged in as root, and did an su to cyrus and news. When I
have seen these intrusion attempts, I have been blocking the host and
its IP range at the firewall.
More information about the users