|
|
I had the same sshd attack 8th of February! Thanks
Hello,
Your post helped me very much: First, after reading your post, I browsed my system logs too and I was very surprised to discover that I had the same type of attacks as yours and in the same period (8th of February):
etc.
Then with your advice and the AllowUsers command, I secured my sshd as much as I could. So your advice arrived just in time! Thanks once again.
Just in time? For what?
This is a **very old** SSH attack. This has been going on for almost a year, and we see it on every machine we administer that has SSH enabled. All it does is try common username/password pairs for names and role accounts. If you have good password security, there is nothing to worry about. Is more security ever bad? Absolutely not; by all means, secure your machine as much as practical. But this is not some kind of "new" attack, and would not compromise any OS X machine in its default configuration with ssh enabled if accounts have reasonable passwords, i.e., not test/test, firstname/firstname, etc. That's all this script does. |
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysNo new commentsLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.05 seconds |
|