I looked at my server’s auth logs today and was unsettled to find thousands of lines like these:
Feb 12 06:49:52 localhost sshd[25416]: Invalid user photo from xxx.xxx.xxx.xxx
Feb 12 06:49:52 localhost sshd[25416]: pam_unix(sshd:auth): check pass; user unknown
Feb 12 06:49:52 localhost sshd[25416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=some.random.domain
Feb 12 06:49:54 localhost sshd[25416]: Failed password for invalid user photo from xxx.xxx.xxx.xxx port 49608 ssh2
I was looking at someone running a brute force attack on my server trying to gain SSH access.
Looking further back in the logs, I found crackers (not the derogatory term for white people but
people who break security maliciously) had been attacking me for at least a month. Luckily
the unsophisticated attack simply tried various username/password combinations. After common
usernames like root, admin, and user were tried, the attackers used names like aaron, gary,
stephanie, etc.
Alright, time to shut these guys down. (All setting changes were made in /etc/ssh/sshd_config
and
on Ubuntu unless otherwise specified.)