News: This forum is now permanently frozen.
Pages: [1]
Topic: Emergency PLEASE HELP  (Read 2744 times)
« on: March 18, 2009, 23:37:22 »
djanie78 *
Posts: 6

I got a rule that should block all ports from WAN destined for my network on port 22 and 23. Does that not mean i should not see any SSH and telnet login attempts to my network(server)Huh?

Am seeing SSH attempts being made to my sever which is obviously on my network from external sources though I got this rule in place.

Am i doing anything wrong? Please help. Thanks
« Reply #1 on: March 19, 2009, 01:07:49 »
knightmb ****
Posts: 341

Are you seeing attempts in the m0n0wall firewall logs or your SSH server logs?

Radius Service for m0n0wall Captive Portal - http://amaranthinetech.com
« Reply #2 on: March 19, 2009, 08:05:46 »
djanie78 *
Posts: 6

Are you seeing attempts in the m0n0wall firewall logs or your SSH server logs?

Am seeing attempts on the SSH logs. The monowall logs show the same external IPs blocked on different ports.
« Reply #3 on: March 19, 2009, 10:39:16 »
markb ****
Posts: 331

If you could post your nat and rules portion of your config.xml this would help us spot any problems.
« Reply #4 on: March 19, 2009, 15:31:33 »
Fred Grayson *****
Posts: 994

Inbound traffic across interfaces is blocked unless specifically allowed, so you don't need any rules to block this. However, if you do add rules and they are misconfigured, then anything is possible.

But without having any information beyond that it does not work properly, not much help can be provided.

--
Google is your friend and Bob's your uncle.
« Reply #5 on: March 19, 2009, 16:43:23 »
knightmb ****
Posts: 341

Are you seeing attempts in the m0n0wall firewall logs or your SSH server logs?

Am seeing attempts on the SSH logs. The monowall logs show the same external IPs blocked on different ports.
You need some help then, someone outside your network on the WAN to poll your SSH server while you adjust the rules to make sure you have them setup right.

By default, no one should be able to get in because m0n0wall blocks everything inbound by default. Is it possible there is another gateway on your network that leads to the outside?

Radius Service for m0n0wall Captive Portal - http://amaranthinetech.com
« Reply #6 on: March 19, 2009, 17:14:21 »
djanie78 *
Posts: 6

Reason i got a rule to block that kind of traffic is because it was actually allowed to pass through as i need SSH access to the server from the WAN then i noticed strange names trying to login as well so i blocked it.

What i have done now is remove the Rule altogether. I should not be seeing any SSH traffic from WAN on my network at all now if all is well. Now we wait  Cool
« Reply #7 on: March 20, 2009, 05:05:03 »
knightmb ****
Posts: 341

Reason i got a rule to block that kind of traffic is because it was actually allowed to pass through as i need SSH access to the server from the WAN then i noticed strange names trying to login as well so i blocked it.

What i have done now is remove the Rule altogether. I should not be seeing any SSH traffic from WAN on my network at all now if all is well. Now we wait  Cool
Oh, that's just automated programs doing a brute force attack. I see that all the time in my logs, always using lame names like "Administrator" or "root" for a SSH login when they are all usually disabled by default.

If you open up the WAN to your SSH, that's bound to happen. My FTP gets megabytes of junk logs from bot networks with zombies trying to login and guess the password. There are programs out there to ban logins after so many failed attempts if you are really that worried about your security.

Radius Service for m0n0wall Captive Portal - http://amaranthinetech.com
 
Pages: [1]
 
 
Powered by SMF 1.1.20 | SMF © 2013, Simple Machines