Back

Securing your Plesk based VPS with 34SP.com

25 March 2009

34SP.com Staff

If you are using our VPS hosting here at 34SP.com or are considering a VPS server, this blog post may be of great help. Although we have covered some points of this on our forums and in our support articles putting this into a single post may benefit some users. One of the most common issues we see at 34SP.com is servers being abused via brute force logins on sshd against the ‘root’ user.

If you looked in your /var/log/messages file and seen something like this – then this is happening too you:

Sep 7 21:23:02 HOSTNAME sshd(pam_unix)[23860]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.2.3.4 user=root
Sep 7 21:23:02 HOSTNAME sshd(pam_unix)[23861]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.2.3.4 user=root
Sep 7 21:23:07 HOSTNAME sshd(pam_unix)[23917]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.2.3.4 user=root