From: Robert S <rob...@gm...> - 2010-03-11 11:22:53
|
I have been getting a lot of these messages: Mar 11 13:40:36 myhost sshd[30548]: User root from 202.111.128.225 not allowed because none of user's groups are listed in AllowGroups These are not triggering any response to sshguard. I have the following line in my /etc/ssh/sshd_config: AllowGroups ssh_users Is there some way that sshgurard can be got to respond to these? Alternatively is it possible to activate the firewall after an attempted root login? |
From: Robert S <rob...@gm...> - 2010-03-17 07:18:16
|
After a bit of fiddling around it appears that this pattern is being recognised, but there is no evidence of this in my system log. It appears that there are no ssghard messages appearing in my log. For example: hostname robert # killall -HUP syslog-ng hostname robert # tail /var/log/messages Mar 17 18:00:32 hostname syslog-ng[30304]: Configuration reload request received, reloading configuration; [ .. other system log messages ] hostname robert # ps ax |grep sshguard 21209 ? Sl 0:00 /usr/sbin/sshguard -f 100:/var/run/sshd.pid -b /usr/local/var/sshguard/blacklist.db -w /etc/sshguard.whitelist I am using syslog-ng 3.0.4 on gentoo. Here is the relevant bit out of my syslog-ng config: # pass only entries with auth+authpriv facilities from programs other than sshguard filter f_sshguard { facility(auth, authpriv) and not program("sshguard"); }; # pass entries built with this format destination sshguard { program("/usr/sbin/sshguard -f 100:/var/run/sshd.pid -b /usr/local/var/sshguard/blacklist.db -w /etc/sshguard.whitelist" template("$DATE $FULLHOST $MSGHDR$MESSAGE\n") ); }; log { source(src); filter(f_sshguard); destination(sshguard); }; I've used the log sucker and SSHGUARD_DEBUG, but this is rather cumbersome and really only useful for debugging. |
From: Mij <mi...@ss...> - 2010-03-17 18:44:25
|
On Mar 17, 2010, at 8:18 , Robert S wrote: > After a bit of fiddling around it appears that this pattern is being recognised, but there is no evidence of this in my system log. It appears that there are no ssghard messages appearing in my log. For example: > > hostname robert # killall -HUP syslog-ng > hostname robert # tail /var/log/messages > Mar 17 18:00:32 hostname syslog-ng[30304]: Configuration reload request received, reloading configuration; > [ .. other system log messages ] > hostname robert # ps ax |grep sshguard > 21209 ? Sl 0:00 /usr/sbin/sshguard -f 100:/var/run/sshd.pid -b /usr/local/var/sshguard/blacklist.db -w /etc/sshguard.whitelist > > I am using syslog-ng 3.0.4 on gentoo. Here is the relevant bit out of my syslog-ng config: > > # pass only entries with auth+authpriv facilities from programs other than sshguard > filter f_sshguard { facility(auth, authpriv) and not program("sshguard"); }; > # pass entries built with this format > destination sshguard { > program("/usr/sbin/sshguard -f 100:/var/run/sshd.pid -b /usr/local/var/sshguard/blacklist.db -w /etc/sshguard.whitelist" > template("$DATE $FULLHOST $MSGHDR$MESSAGE\n") > ); > }; > log { source(src); filter(f_sshguard); destination(sshguard); }; Some of the syslog-ng guys can probably help you better here, but this conf snippet is for sending log entries *to* sshguard only, not for gathering message *from* it. sshguard logs its activity with AUTH facility. Where these messages go depends on how you configured this facility (destination and level) -- I'm not familiar with gentoo's default configuration. Try a "grep -r sshguard /var/log" if you have no clue. > I've used the log sucker and SSHGUARD_DEBUG, but this is rather cumbersome and really only useful for debugging. Yes, DEBUG is meant for debug, not regular use. |
From: Mij <mi...@ss...> - 2010-03-11 19:25:29
|
On Mar 11, 2010, at 12:22 , Robert S wrote: > I have been getting a lot of these messages: > > Mar 11 13:40:36 myhost sshd[30548]: User root from 202.111.128.225 not allowed because none of user's groups are listed in AllowGroups > > These are not triggering any response to sshguard. I have the following line in my /etc/ssh/sshd_config: > > AllowGroups ssh_users > > Is there some way that sshgurard can be got to respond to these? Alternatively is it possible to activate the firewall after an attempted root login? It seems that the "pattern submission" feature is still not apparent enough :) Please submit to http://www.sshguard.net/support/attacks/submit/ This is an interesting case, I'll bump up its priority. |