Voilà le mail que m’a envoyé fail2ban :
[code]Hi,
The IP 192.168.0.Y has just been banned by Fail2Ban after
3 attempts against ssh.
Regards,
Fail2Ban
[/code]
cette IP est celle de ma machine principale qui me sert habituellement à gérer mon serveur en SSH.
Bien sûr, je ne peux plus y accéder via cette machine mais via une autre du réseau, j’ai ces logs :
ricardo@serveur:~$ grep sshd /var/log/auth.log
Dec 28 00:20:18 serveur sshd[24244]: Failed password for ricardo from 192.168.0.Yport 56659 ssh2
Dec 28 00:20:18 serveur sshd[24244]: Failed password for ricardo from 192.168.0.Yport 56659 ssh2
Dec 28 00:20:18 serveur sshd[24244]: Failed password for ricardo from 192.168.0.Y port 56659 ssh2
Dec 28 02:04:08 serveur sshd[30551]: Accepted password for ricardo from 192.168.0.Xport 50851 ssh2
Dec 28 02:04:08 serveur sshd[30551]: pam_unix(sshd:session): session opened for user ricardo by (uid=0)
Dec 28 02:08:55 serveur sshd[30565]: Received disconnect from 192.168.0.X: 11: disconnected by user
Dec 28 02:08:55 serveur sshd[30551]: pam_unix(sshd:session): session closed for user ricardo
Dec 28 02:10:33 serveur sshd[30966]: Accepted password for ricardo from 192.168.0.Xport 45801 ssh2
Dec 28 02:10:33 serveur sshd[30966]: pam_unix(sshd:session): session opened for user ricardo by (uid=0)
Dec 28 02:11:58 serveur sshd[30979]: Received disconnect from 192.168.0.6: 11: disconnected by user
Dec 28 02:11:58 serveur sshd[30966]: pam_unix(sshd:session): session closed for user ricardo
Dec 28 02:12:05 serveur sshd[24720]: Received signal 15; terminating.
Dec 28 11:38:55 serveur sshd[1008]: Server listening on 0.0.0.0 port XXXXXX
Dec 28 11:38:55 serveur sshd[1008]: Server listening on :: port XXXXXXX
Dec 28 12:15:08 serveur sshd[3881]: Accepted password for ricardo from 192.168.0Xport 47307 ssh2
Dec 28 12:15:08 serveur sshd[3881]: pam_unix(sshd:session): session opened for user ricardo by (uid=0)
Comment fait un malintentionné pour tenter une intrusion par l’IP interne ?

