Bonjour,
j’ai constaté que mon serveur réagit bizarrement, après vérification je m’aperçois que mon fichier /var/log/auth.log a des tentative de connexion avec des users que je n’est pas et des adresse ip exterieur inconnu.
Asterisk m’appelle tout seul avec le numéro 101 et quand je décroche il y a personne ? la nuit c’est plutôt dérangent.
le plus surprenant c’est que dans le Logs d’authentification il y a des fragments de mots que j’ai tapés directement dans le terminal, comme : commande / mot de passe / login ! tapé sur une autre machine du réseau ???
Suis je vraiment protégé, faut il réinstaller mon serveur complètement a zéro, y a t’il d’autre vérification à effectuer, si non que faut il faire ?
Je ne suis pas un expert sous linux .
Merci.
Users du serveur
root@debian:~# ls -al /home
total 16
drwxr-xr-x 3 root root 4096 4 janv. 13:48 .
drwxr-xr-x 23 root root 4096 15 juil. 2012 ..
drwxr-xr-x 34 serveur serveur 4096 21 févr. 14:45 serveur
root@debian:~#
Logs d’authentification
PS : Je ne peut pas tout mettre le fichier est trop long.
[code]root@debian:~# cat /var/log/auth.log
Feb 22 08:42:54 debian sshd[14704]: Invalid user music from 121.15.207.113
Feb 22 08:42:54 debian sshd[14704]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:42:54 debian sshd[14704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113
Feb 22 08:42:54 debian sshd[14697]: Failed password for invalid user ev1user from 121.15.207.113 port 27015 ssh2
Feb 22 08:42:54 debian sshd[14698]: Failed password for invalid user sergey from 121.15.207.113 port 27031 ssh2
Feb 22 08:42:55 debian sshd[14705]: Invalid user newspost from 121.15.207.113
Feb 22 08:42:55 debian sshd[14706]: Invalid user dllstx1 from 121.15.207.113
Feb 22 08:42:55 debian sshd[14705]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:42:55 debian sshd[14705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113
Feb 22 08:42:55 debian sshd[14706]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:42:55 debian sshd[14706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113
Feb 22 08:42:55 debian sshd[14701]: Failed password for invalid user dispatcher from 121.15.207.113 port 27527 ssh2
Feb 22 08:42:56 debian sshd[14703]: Failed password for invalid user fax from 121.15.207.113 port 27684 ssh2
Feb 22 08:42:56 debian sshd[14704]: Failed password for invalid user music from 121.15.207.113 port 27696 ssh2
Feb 22 08:42:56 debian sshd[14705]: Failed password for invalid user newspost from 121.15.207.113 port 27718 ssh2
Feb 22 08:42:56 debian sshd[14706]: Failed password for invalid user dllstx1 from 121.15.207.113 port 27720 ssh2
Feb 22 08:42:57 debian sshd[14712]: Invalid user nurlan from 121.15.207.113
Feb 22 08:42:57 debian sshd[14711]: Invalid user ev2 from 121.15.207.113
Feb 22 08:42:57 debian sshd[14712]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:42:57 debian sshd[14712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113
Feb 22 08:46:20 debian sshd[15034]: Failed password for invalid user mvnuser from 121.15.207.113 port 34685 ssh2
Feb 22 08:46:20 debian sshd[15035]: Failed password for invalid user make from 121.15.207.113 port 34683 ssh2
Feb 22 08:46:23 debian sshd[15039]: Invalid user mythtv from 121.15.207.113
Feb 22 08:46:23 debian sshd[15040]: Invalid user music from 121.15.207.113
Feb 22 08:46:23 debian sshd[15039]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:46:23 debian sshd[15039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113
Feb 22 08:46:23 debian sshd[15040]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:46:23 debian sshd[15040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113
Feb 22 08:46:25 debian sshd[15040]: Failed password for invalid user music from 121.15.207.113 port 36309 ssh2
Feb 22 08:46:25 debian sshd[15039]: Failed password for invalid user mythtv from 121.15.207.113 port 36308 ssh2
Feb 22 08:46:28 debian sshd[15043]: Invalid user mvntest from 121.15.207.113
Feb 22 08:46:28 debian sshd[15044]: Invalid user mythtv from 121.15.207.113
Feb 22 08:46:28 debian sshd[15043]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:46:28 debian sshd[15043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113
Feb 22 08:47:48 debian sshd[15109]: Failed password for invalid user ev2 from 121.15.207.113 port 61686 ssh2
Feb 22 08:47:48 debian sshd[15108]: Failed password for invalid user fax from 121.15.207.113 port 61685 ssh2
Feb 22 08:47:51 debian sshd[15112]: Invalid user ev2user from 121.15.207.113
Feb 22 08:47:51 debian sshd[15113]: Invalid user fax from 121.15.207.113
Feb 22 08:47:51 debian sshd[15112]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:47:51 debian sshd[15112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113
Feb 22 08:47:51 debian sshd[15113]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:47:51 debian sshd[15113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113
Feb 22 08:47:53 debian sshd[15112]: Failed password for invalid user ev2user from 121.15.207.113 port 63114 ssh2
Feb 22 08:47:53 debian sshd[15113]: Failed password for invalid user fax from 121.15.207.113 port 63115 ssh2
Feb 22 08:47:56 debian sshd[15116]: Invalid user faq from 121.15.207.113
Feb 22 08:47:56 debian sshd[15117]: Invalid user fax from 121.15.207.113
Feb 22 08:47:56 debian sshd[15116]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:47:56 debian sshd[15116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113
eb 22 08:48:07 debian sshd[15122]: Failed password for invalid user fax from 121.15.207.113 port 3020 ssh2
Feb 22 08:48:09 debian sshd[15124]: Invalid user fax from 121.15.207.113
Feb 22 08:48:09 debian sshd[15124]: pam_unix(sshd:auth): check pass; user unknown
Feb 22 08:48:09 debian sshd[15124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.207.113[/code]
Connexions Internet actives
root@debian:~# netstat -antp
Connexions Internet actives (serveurs et établies)
Proto Recv-Q Send-Q Adresse locale Adresse distante Etat PID/Program name
tcp 0 0 0.0.0.0:4709 0.0.0.0:* LISTEN 1268/amuleweb
tcp 0 0 0.0.0.0:4711 0.0.0.0:* LISTEN 1258/amuled
tcp 0 0 127.0.0.1:3306 0.0.0.0:* LISTEN 1569/mysqld
tcp 0 0 0.0.0.0:1099 0.0.0.0:* LISTEN 726/mochad
tcp 0 0 0.0.0.0:1100 0.0.0.0:* LISTEN 726/mochad
tcp 0 0 0.0.0.0:1101 0.0.0.0:* LISTEN 726/mochad
tcp 0 0 0.0.0.0:10000 0.0.0.0:* LISTEN 1858/perl
tcp 0 0 0.0.0.0:4661 0.0.0.0:* LISTEN 1258/amuled
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1542/sshd
tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 1848/master
tcp 0 0 127.0.0.1:42183 127.0.0.1:4711 ESTABLISHED 1268/amuleweb
tcp 0 0 192.168.0.1:22 192.168.0.4:54872 ESTABLISHED 16330/0
tcp 0 0 127.0.0.1:4711 127.0.0.1:42183 ESTABLISHED 1258/amuled
tcp 0 220 192.168.0.1:4661 83.41.184.109:60505 ESTABLISHED 1258/amuled
tcp 0 0 192.168.0.1:37912 91.225.136.126:1887 ESTABLISHED 1258/amuled
tcp 1 1 192.168.0.1:34380 221.234.169.160:7115 LAST_ACK -
tcp 0 0 192.168.0.1:39860 1.202.22.3:4682 TIME_WAIT -
tcp6 0 0 :::8585 :::* LISTEN 1270/apache2
tcp6 0 0 :::139 :::* LISTEN 1237/smbd
tcp6 0 0 :::80 :::* LISTEN 1270/apache2
tcp6 0 0 :::22 :::* LISTEN 1542/sshd
tcp6 0 0 :::445 :::* LISTEN 1237/smbd
root@debian:~#
Scan des ports ouverts
[code]root@debian:~# nmap 192.168.0.1 -p 1-65535
Starting Nmap 5.00 ( http://nmap.org ) at 2013-02-22 12:30 CET
Interesting ports on 192.168.0.1:
Not shown: 65522 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
80/tcp open http
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1099/tcp open unknown
1100/tcp open unknown
1101/tcp open unknown
4661/tcp open unknown
4709/tcp open unknown
4711/tcp open unknown
8585/tcp open unknown
10000/tcp open snet-sensor-mgmt
Nmap done: 1 IP address (1 host up) scanned in 16.67 seconds
root@debian:~# [/code]
iptables
[code]root@debian:~# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT tcp – anywhere anywhere tcp dpt:ssh
ACCEPT tcp – anywhere anywhere tcp dpt:ipp
ACCEPT tcp – anywhere anywhere tcp dpt:www
ACCEPT tcp – anywhere anywhere tcp dpt:www
ACCEPT udp – anywhere anywhere udp dpt:sip
ACCEPT udp – anywhere anywhere udp dpts:10000:20000
ACCEPT tcp – anywhere anywhere tcp dpt:www
ACCEPT tcp – anywhere anywhere tcp dpt:sip
ACCEPT udp – anywhere anywhere udp dpt:sip
ACCEPT tcp – anywhere anywhere tcp dpt:8585
ACCEPT tcp – anywhere anywhere tcp dpt:4661
ACCEPT udp – anywhere anywhere udp dpt:4712
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
root@debian:~# [/code]
Merci.