Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

fedora

Posted on 2011-03-12
2
Medium Priority
?
299 Views
Last Modified: 2012-05-11
HELP!! - I'm not good at this - I have this entry in /var/spool/mail/root

users logging in through sshd:
   root:
      172.16.26.113 (itw-ws-0017.mydomain.com ) : 1 time
** unmatched entries **
warning /etc/hosts.allow line 14: missing ":" separator : 1 time (s)
address 172.16.26.113 maps to itw-ws-mydomain.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! : 1 time (s)

how can i see if this is a real possible break in?  Also - is there a way to see who is logged in to 172.16.26.113 using the ip address?
0
Comment
Question by:JeffBeall
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 80

Accepted Solution

by:
arnold earned 2000 total points
ID: 35117367
hosts.allow has the format:
service:host or list of hosts.
The error seems to suggest that you have
entry entry2
versus
entry: entry2
0
 
LVL 1

Author Closing Comment

by:JeffBeall
ID: 35117455
you were right! I freaked out over nothing.
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I don't pretend to be an expert at this, but I have found a few things that are useful. I hope that sharing them here will help others, so they will not have to face some rather hard choices. Since I felt this to be a topic of enough importance and…
This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question