?
Solved

fedora

Posted on 2011-03-12
2
Medium Priority
?
297 Views
Last Modified: 2012-05-11
HELP!! - I'm not good at this - I have this entry in /var/spool/mail/root

users logging in through sshd:
   root:
      172.16.26.113 (itw-ws-0017.mydomain.com ) : 1 time
** unmatched entries **
warning /etc/hosts.allow line 14: missing ":" separator : 1 time (s)
address 172.16.26.113 maps to itw-ws-mydomain.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! : 1 time (s)

how can i see if this is a real possible break in?  Also - is there a way to see who is logged in to 172.16.26.113 using the ip address?
0
Comment
Question by:JeffBeall
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 79

Accepted Solution

by:
arnold earned 2000 total points
ID: 35117367
hosts.allow has the format:
service:host or list of hosts.
The error seems to suggest that you have
entry entry2
versus
entry: entry2
0
 
LVL 1

Author Closing Comment

by:JeffBeall
ID: 35117455
you were right! I freaked out over nothing.
0

Featured Post

 [eBook] Windows Nano Server

Download this FREE eBook and learn all you need to get started with Windows Nano Server, including deployment options, remote management
and troubleshooting tips and tricks

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A look at what happened in the Verizon cloud breach.
Let's recap what we learned from yesterday's Skyport Systems webinar.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 22 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question