Ответы пользователя по тегу Системное администрирование
  • Как закрыть досуп горе хакерам?

    @bukass
    Современным ботам, пофигу на нестандартный порт.

    Для тех кто все еще сомневается.

    Feb 9 05:38:25 vyatta sshd[31650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:38:29 vyatta sshd[31652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:38:47 vyatta sshd[31654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:38:51 vyatta sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:38:55 vyatta sshd[31658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:39:14 vyatta sshd[31660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:39:18 vyatta sshd[31662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:39:22 vyatta sshd[31664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:39:41 vyatta sshd[31666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:40:40 vyatta sshd[31682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:40:59 vyatta sshd[31684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:41:02 vyatta sshd[31686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:41:06 vyatta sshd[31688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:41:25 vyatta sshd[31690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:41:28 vyatta sshd[31692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 05:41:32 vyatta sshd[31694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.51.49 user=root
    Feb 9 08:05:20 vyatta pptpd[31792]: CTRL: EOF or bad error reading ctrl packet length.
    Feb 9 08:05:20 vyatta pptpd[31792]: CTRL: couldn't read packet header (exit)
    Feb 9 08:05:20 vyatta pptpd[31792]: CTRL: CTRL read failed
    Feb 9 11:50:19 vyatta sshd[31830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:50:31 vyatta sshd[31830]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:50:31 vyatta sshd[31830]: PAM service(sshd) ignoring max retries; 5 > 3
    Feb 9 11:51:24 vyatta sshd[31848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:51:35 vyatta sshd[31848]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:51:35 vyatta sshd[31848]: PAM service(sshd) ignoring max retries; 5 > 3
    Feb 9 11:54:32 vyatta sshd[31900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:54:44 vyatta sshd[31900]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:54:44 vyatta sshd[31900]: PAM service(sshd) ignoring max retries; 5 > 3
    Feb 9 11:55:54 vyatta sshd[31922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:56:05 vyatta sshd[31922]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:56:05 vyatta sshd[31922]: PAM service(sshd) ignoring max retries; 5 > 3
    Feb 9 11:56:18 vyatta sshd[31927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:56:30 vyatta sshd[31927]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:56:30 vyatta sshd[31927]: PAM service(sshd) ignoring max retries; 5 > 3
    Feb 9 11:57:30 vyatta sshd[31946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:57:41 vyatta sshd[31946]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 11:57:41 vyatta sshd[31946]: PAM service(sshd) ignoring max retries; 5 > 3
    Feb 9 11:59:55 vyatta sshd[31986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 12:00:06 vyatta sshd[31986]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 12:00:06 vyatta sshd[31986]: PAM service(sshd) ignoring max retries; 5 > 3
    Feb 9 12:02:13 vyatta sshd[32025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 12:02:24 vyatta sshd[32025]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.10.124 user=root
    Feb 9 12:02:24 vyatta sshd[32025]: PAM service(sshd) ignoring max retries; 5 > 3
    Feb 9 13:50:12 vyatta pptpd[32103]: CTRL: EOF or bad error reading ctrl packet length.
    Feb 9 13:50:12 vyatta pptpd[32103]: CTRL: couldn't read packet header (exit)
    Feb 9 13:50:12 vyatta pptpd[32103]: CTRL: CTRL read failed
    Feb 10 12:46:32 vyatta sshd[32345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:46:39 vyatta sshd[32348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:47:00 vyatta sshd[32350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:47:20 vyatta sshd[32352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:47:27 vyatta sshd[32354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:47:51 vyatta sshd[32356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:48:03 vyatta sshd[32358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:48:15 vyatta sshd[32360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:48:44 vyatta sshd[32362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:48:51 vyatta sshd[32364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:48:58 vyatta sshd[32366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:49:18 vyatta sshd[32368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:49:27 vyatta sshd[32370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 10 12:49:31 vyatta sshd[32372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.235 user=root
    Feb 11 08:28:57 vyatta pptpd[32594]: CTRL: EOF or bad error reading ctrl packet length.
    Feb 11 08:28:57 vyatta pptpd[32594]: CTRL: couldn't read packet header (exit)
    Feb 11 08:28:57 vyatta pptpd[32594]: CTRL: CTRL read failed
    Feb 11 14:13:46 vyatta pptpd[32626]: CTRL: EOF or bad error reading ctrl packet length.
    Feb 11 14:13:46 vyatta pptpd[32626]: CTRL: couldn't read packet header (exit)
    Feb 11 14:13:46 vyatta pptpd[32626]: CTRL: CTRL read failed
    Feb 11 14:49:17 vyatta pptpd[32633]: CTRL: EOF or bad error reading ctrl packet length.
    Feb 11 14:49:17 vyatta pptpd[32633]: CTRL: couldn't read packet header (exit)
    Feb 11 14:49:17 vyatta pptpd[32633]: CTRL: CTRL read failed
    Feb 13 08:37:59 vyatta sshd[984]: warning: can't get client address: Connection reset by peer
    Feb 13 09:39:11 vyatta pptpd[1039]: CTRL: EOF or bad error reading ctrl packet length.
    Feb 13 09:39:11 vyatta pptpd[1039]: CTRL: couldn't read packet header (exit)
    Feb 13 09:39:11 vyatta pptpd[1039]: CTRL: CTRL read failed
    Feb 13 14:45:25 vyatta sshd[1071]: pam_unix(sshd:auth): check pass; user unknown
    Feb 13 14:45:25 vyatta sshd[1071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.57.72.114
    Feb 13 14:45:31 vyatta sshd[1073]: pam_unix(sshd:auth): check pass; user unknown
    Feb 13 14:45:31 vyatta sshd[1073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.57.72.114
    Feb 13 14:45:35 vyatta sshd[1076]: pam_unix(sshd:auth): check pass; user unknown
    Feb 13 14:45:35 vyatta sshd[1076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.57.72.114
    Feb 13 14:45:40 vyatta sshd[1078]: pam_unix(sshd:auth): check pass; user unknown
    Feb 13 14:45:40 vyatta sshd[1078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.57.72.114

    А для запрета ssh с каких попало адресов /etc/hosts.deny /etc/hosts.alow
    Ответ написан
    Комментировать
  • Какой программный watchdog посоветуете для win или linux?

    @bukass
    sudo apt-get install watchdog

    Но для
    Основное требование - по расписанию пинговать 10-20 устройств и в случае проблем писать в лог или слать на почту уведомление.

    есть Nagios
    Ответ написан
    Комментировать
  • Как можно запоролить браузер, чтобы никто не заходил в мой вк и историю?

    @bukass
    За вас уже все придумано, не сидите под админом. Сделай две учетки, одну для себя другую/другие для остальных. Все!
    Ответ написан
    Комментировать
  • Как запрещать неизвестные устройства в сети?

    @bukass
    ip unnambered + DHCP
    habrahabr.ru/post/108453
    Ответ написан
    Комментировать
  • Как настроить приоретизацию траффика на микротике?

    @bukass
    Откройте для себя PCQ и качайте хоть всем офисом, всем достанется поровну.
    Ответ написан
    Комментировать
  • Перенос системы с помощью dd, как правильно?

    @bukass
    dd - буквально d-иск d-амп - dd пофигу даже какая там файловая система. Копируется образ диска.
    dd прикольно делать так
    backup dd if=/dev/sda1 | gzip - | dd of=/path_to_backups/fs.img.gz
    а потом восстановить так dd if=fs.img.gz | gunzip - | dd of=/dev/sda1
    Ответ написан
    Комментировать
  • Как подключиться к нескольким VPN серверам?

    @bukass
    К примеру mikrotik.

    > interface print
    Flags: D - dynamic, X - disabled, R - running, S - slave 
     #     NAME                                TYPE       ACTUAL-MTU L2MTU  MAX-L2MTU MAC-ADDRESS      
     0  R  ether1-gateway                      ether            1500  1598       4074 4C:5E:0C:58:DC:84
     1  RS ether2-master-local                 ether            1500  1598       4074 4C:5E:0C:58:DC:85
     2  RS ether3-slave-local                  ether            1500  1598       4074 4C:5E:0C:58:DC:86
     3  R  ether4-slave-local                  ether            1500  1598       4074 4C:5E:0C:58:DC:87
     4  R  ether5-slave-local                  ether            1500  1598       4074 4C:5E:0C:58:DC:88
     5  X  wlan-guest                          wlan                                   4E:5E:0C:58:DC:8A
     6  RS wlan-home                           wlan             1500  2290            4C:5E:0C:58:DC:89
     7 DR  <ovpn-mikrotik>                     ovpn-in          1500
     8 DR  <ovpn-pavloof-1>                    ovpn-in          1500
     9  R  bridge-local                        bridge           1500  1598            4C:5E:0C:58:DC:85
    10  X  bridge1                             bridge                                 00:00:00:00:00:00
    11  X  eoip-tunnel1                        eoip             1458 65535            02:E5:1F:8D:C1:C3
    12  R  l2tp-out1                           l2tp-out         1450
    13  R  loopback                            bridge           1500 65535            00:00:00:00:00:00
    14  X  ppp-out1                            ppp-out   
    15  R  pptp-out1                           pptp-out         1450
    16  R  ;;; test vlan_ctrl_to_switch
           vlan12                              vlan             1500  1594            4C:5E:0C:58:DC:88
    17  R  vlan2800                            vlan             1500  1594            4C:5E:0C:58:DC:84
    18     ;;; test vlan_dhcp_to_switch
           vlan3692                            vlan             1500 65531            02:E5:1F:8D:C1:C3
    Ответ написан
    Комментировать