Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

bye bye messages from ssh attempts

Posted on 2009-04-11
10
Medium Priority
?
1,363 Views
Last Modified: 2012-05-06
Hi All,

This is really just out of curiosity, I get loads of messages which look something like;
   Received disconnect from 129.1.64.81: 11: Bye Bye

Now I'm happy I'm OK and I have denyhosts enabled and secure passwords etc etc
I was wondering what is used to generate the "Bye Bye" message...

Anyone know?
0
Comment
Question by:jools
  • 4
  • 3
  • 3
10 Comments
 
LVL 9

Expert Comment

by:tl121000
ID: 24122235
These as you know are hacking attempts, since SSH is a well known port (22).
you can tighten your firewall to allow only valid users
or
check this out...
http://www.it-slav.net/blogs/?p=183
 
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 1000 total points
ID: 24122314
sadly, its pretty common - one of the "common currency" ssh haxxor scripts uses that disconnect string, and usually tries to log in as guest/guest or test/test before trying a brute force attack.

Each entry should *also* have a number in square brackets, which is the process ID - once you see the byebye, you can use that number with grep to locate any other records in the log for the same process ID - its also worth grepping on the IP address given, to see if there are any other threads that share that IP.

problematic lines will be something like "failed password" - showing attempts to log in.
0
 
LVL 9

Expert Comment

by:tl121000
ID: 24122351
If you do not have the rights to configure your FW, you can also configure the hosts.allow file to minimize these occurences...
 
Please refer to these articles and threads to figure out the best way to resolve your problem (or at least minimize it).
http://closedsrc.org/_static/dn-articles/hosts_allow.html
http://lists.freebsd.org/pipermail/freebsd-questions/2006-May/122583.html
 
0
Fill in the form and get your FREE NFR key NOW!

Veeam is happy to provide a FREE NFR server license to certified engineers, trainers, and bloggers.  It allows for the non‑production use of Veeam Agent for Microsoft Windows. This license is valid for five workstations and two servers.

 
LVL 33

Expert Comment

by:Dave Howe
ID: 24122384
really, its just background noise - I did a bit of checking, and of the three scripts I could find that left this trace in the log, they did so by use of a freeware ssh library called "libssh" (logically enough) - for which this is the default disconnect string.

if you *really* want security from ssh, disallow password logins entirely and require use of a client rsa or dsa key to gain access.
0
 
LVL 9

Expert Comment

by:tl121000
ID: 24125813
DaveHowe,
I agree with you about background noise, but if there is a particular IP address that is always attempting...  why not block it out completely and minimize a potential  hacking oppurtunity all together.
T
 
0
 
LVL 19

Author Comment

by:jools
ID: 24126855
Thanks Dave,

So if the message is logged as bye bye I can almost guarantee it is a hack attempt by someone using a "haxxor script" rather than someone making a mistake and guessing the address wrong.

Thats great.... I've been hit a lot by the ip address above which seems to belong to an educational establishment in Ohio USA. I may, if it continues, get in touch with their abuse account to see if they can have a word in the offenders shell-like or perhaps shut down the offending server if it's been compromised.

As I said before, I'm happy my setup is secure, I just wondered what generated the Bye Bye message in the logs.
0
 
LVL 19

Author Comment

by:jools
ID: 24126886
Dave,

You mentioned in http:#a24122384 you found three scripts, do you have the names, I'd like to do a bit more digging around.

I've been logging the connections using wireshark and netcat.

0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 24127055
one was from 'haita team'  -  sshf.c - and another was sshbrute.c from 'lizard', but which credits haita team for some code. the third was a scanning module for metasploit, but as I say, the commonality is use of http://0xbadc0de.be/wiki/ (not to be confused with http://www.libssh2.org/ which has a similar name)
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 24127242
this would appear to be applicable too:
http://it.slashdot.org/article.pl?sid=09/04/12/2110257
0
 
LVL 19

Author Closing Comment

by:jools
ID: 31569157
Thanks Dave, all the  comments have been most helpful
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
OfficeMate Freezes on login or does not load after login credentials are input.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
Suggested Courses

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question