[prev in list] [next in list] [prev in thread] [next in thread]
List: openssh-unix-dev
Subject: Re: idea against hacks - help to IDS of a new generation
From: Kaleta Stanley <openssh-unix-dev () kaleta ! sk>
Date: 2005-09-30 19:52:10
Message-ID: Pine.LNX.4.61.0509302147410.26511 () kaleta ! sk
[Download RAW message or body]
Hello,
thank you for your answers ;)
sshd is not only one source for intrussion detection for sure ;)
i'll conciliate with syslog ;)
br
Stanley
On Fri, 30 Sep 2005, Damien Miller wrote:
> On Thu, 29 Sep 2005, Peter Stuge wrote:
>
>> On Thu, Sep 29, 2005 at 10:22:03PM +0200, Kaleta Stanley wrote:
>>> what about to add "optional action" as parameter of sshd
>>> (could be used for IDS' )
>>> in case of intrussion detection (anyway logged to syslog)
>>
>> Both your suggestions have been seen before, and the answer is that
>> OpenSSH already exports the needed information through syslog, and
>> that's where you (and tools) should look in order to make any
>> decisions based on failed logins.
>
> Yes, and at the risk of repeating myself: a system that monitors and
> reacts to system logs can help with *all* password guessing attacks, not
> just those that happen to target ssh.
>
> -d
>
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev@mindrot.org
> http://www.mindrot.org/mailman/listinfo/openssh-unix-dev
>
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@mindrot.org
http://www.mindrot.org/mailman/listinfo/openssh-unix-dev
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic