[mythtv-users] SSH break in attempt this morning using mythtv user
chris at cpr.homelinux.net
chris at cpr.homelinux.net
Tue Feb 28 20:43:55 UTC 2006
On Tue, Feb 28, 2006 at 02:46:35PM +1100, Michael Fox wrote:
> Or atleast have a password other then something like "password". I
> allow mythtv user to logon in via ssh personally, but it has a
> password other then something like "password".
>
> Although I probably shouldn't allow it to ssh, and then just su to
> mythtv as I need to.
Unless your machine is using auto-login to run the frontend at boot,
you can disable the mythtv account completely. If you're using
auto-login, you can create a different user for that purpose.
Anything that needs to run as mythtv is started from a root job using
suid anyway.
On my machine I run ssh on a different port, block root logins via
ssh, and disable all machine and/or inactive user accounts (including
mythtv) right in /etc/shadow. On top of that, I use a log-watch
program (fail2ban) that temporarily firewalls any incoming connection
that fails authentication after a few tries, just in case someone
finds my ssh port or decides to try guessing passwords using imaps.
Since my network also has a WPA-enabled WiFi port, I also run
arpwatch so that I get an email any time a new network device is
detected, just in case someone manages to find a way to break the
WiFi security.
These programs are all easy to configure and take up almost no CPU or
memory, so they're definitely a good investment.
--
"When fascism comes to America, it will be wrapped in the flag and
carrying the cross." - Sinclair Lewis (1935)
More information about the mythtv-users
mailing list