[arm-allstar] Does this look like someone is brute force attacking my node?

Doug Crompton wa3dsp at gmail.com
Wed Feb 26 11:55:06 EST 2020


Chris,

 The Linux command prompt is what you get when you ssh in and select item 9
"Start Bash Shell Interface" on the menu. When that is selected you are in
Linux command mode and all Linux commands apply. Bash is a scripting
language. I suggest if you want to become more efficient in Linux that you
get one of the many books available on the topic.


*73 Doug*

*WA3DSP*

*http://www.crompton.com/hamradio <http://www.crompton.com/hamradio>*

On Wed, Feb 26, 2020 at 1:49 AM "Chris Smart via ARM-allstar" <
arm-allstar at hamvoip.org> wrote:

> Dumb beginner question time: what's bash? Is that the prompt I get
> when I use WINSCP to connect to my Mnode and edit .conf files?
>
> (different from the menus I get when I SSH in?)
>
> At 04:14 PM 2/25/2020, you wrote:
>
> >Also, there is random password generation software installed in the
> >HamVoIP distro, accessible from the bash prompt. For example, to make a
> >10 character long random password:
> >
> >makepasswd -l 10
> >
> >73, David KB4FXC
> >
> >
> >
> >On Tue, 25 Feb 2020, "Doug Crompton via ARM-allstar" wrote:
> >
> > > BTW - if you want a way to generate a good random PW here is a site:
> > >
> > > https://passwordsgenerator.net/
> > >
> > > Just make sure you write passwords down somewhere in a safe place!
> > >
> > >
> > > *73 Doug*
> > >
> > > *WA3DSP*
> > >
> > > *http://www.crompton.com/hamradio <http://www.crompton.com/hamradio>*
> > >
> > > On Tue, Feb 25, 2020 at 2:14 PM Doug Crompton <wa3dsp at gmail.com>
> wrote:
> > >
> > > > Please keep in mind that in most cases there is no reason to port
> forward
> > > > the ssh port unless you need or want control of your node from a
> remote
> > > > source. Most node operators do not, but they forward this port
> anyhow. If
> > > > you have only an occasional need for outside access then only
> forward for
> > > > that need. Also keep in mind that other than the additional
> > traffic, using
> > > > a good random greater than 10 character upper/lower, numeric, special
> > > > character password is not going to get broken. They eventually give
> up.
> > > > Also the ssh process itself will slow them down.
> > > >
> > > > So lets not make a big deal about this. It comes up like many
> > other topics
> > > > on this list on a cyclic basis when someone complains. The for days
> it
> > > > becomes the topic of discussion. It has gone on forever and will go
> on
> > > > forever. No you can't trace with any reliability who it is so
> > it is usually
> > > > not even worth the time trying.
> > > >
> > > >
> > > > *73 Doug*
> > > >
> > > > *WA3DSP*
> > > >
> > > > *http://www.crompton.com/hamradio <http://www.crompton.com/hamradio
> >*
> > > >
> > > > On Tue, Feb 25, 2020 at 1:53 PM "Don Backstrom - AA7AU via
> ARM-allstar" <
> > > > arm-allstar at hamvoip.org> wrote:
> > > >
> > > >> On Tue 25-Feb-20 06:52, "kd6gdb--- via ARM-allstar" wrote:
> > > >> > Most of em are automated attacks from china.
> > > >>
> > > >>         As the admin for a number of publicly viewable [mostly
> > > >> low-volume]
> > > >> websites, I see lots and lots and lots of bot attacks, of all sorts,
> > > >> from IP addresses from all over the world, including from the
> good-old
> > > >> USA.
> > > >>
> > > >>         For most sites, I am able to block by underlying generally
> > > >> accurate
> > > >> country code for the IP range, but that doesn't stop the US-based
> > > >> attacks (whom I cannot block in toto). Many of those are from
> Amazon,
> > > >> GoDaddy, etc type hosting accounts and I suspect most of those
> accounts
> > > >> are throw-away. Many of the rest from the US seem to be from
> residential
> > > >> networks.
> > > >>
> > > >>         It's anyone guess who is behind any one one of these bot
> > > >> networks, but
> > > >> I can tell exactly where the fault lies ... those gentle innocent
> folks
> > > >> who have NOT properly protected* their home/small-biz
> computers/accounts
> > > >> - which then became infected by the bad guys and are now the hidden
> > > >> fortresses for those bot networks.
> > > >>
> > > >>         <opinion> *BTW: properly protected does NOT mean simply
> paying
> > > >> someone
> > > >> else for a glossy "Anti-whatever" package and understanding nothing
> > > >> about it. It also, in my mind at least, means NOT running Windows10
> > > >> unless you understand it and have fully secured it. M$ is a big
> part of
> > > >> the problem, certainly not the solution. </opinion>
> > > >>
> > > >>         If it's convenient, you're at risk (as well as everyone
> else)!
> > > >>
> > > >>         We have met the enemy and he is us!  (Pogo Papers, c. 1953)
> > > >>
> > > >>         Just another perspective,
> > > >>
> > > >>         - Don - AA7AU
> > > >> _______________________________________________
> > > >>
> > > >> ARM-allstar mailing list
> > > >> ARM-allstar at hamvoip.org
> > > >> http://lists.hamvoip.org/cgi-bin/mailman/listinfo/arm-allstar
> > > >>
> > > >> Visit the BBB and RPi2/3/4 web page - http://hamvoip.org
> > > >>
> > > >
> > > _______________________________________________
> > >
> > > ARM-allstar mailing list
> > > ARM-allstar at hamvoip.org
> > > http://lists.hamvoip.org/cgi-bin/mailman/listinfo/arm-allstar
> > >
> > > Visit the BBB and RPi2/3/4 web page - http://hamvoip.org
> > >
> >
> >_______________________________________________
> >
> >ARM-allstar mailing list
> >ARM-allstar at hamvoip.org
> >http://lists.hamvoip.org/cgi-bin/mailman/listinfo/arm-allstar
> >
> >Visit the BBB and RPi2/3/4 web page - http://hamvoip.org
>
> _______________________________________________
>
> ARM-allstar mailing list
> ARM-allstar at hamvoip.org
> http://lists.hamvoip.org/cgi-bin/mailman/listinfo/arm-allstar
>
> Visit the BBB and RPi2/3/4 web page - http://hamvoip.org
>


More information about the ARM-allstar mailing list