Quantcast
Aktuelles
Digital Eliteboard - Das Digitale Technik Forum

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

/var/log 100% used

grille01

Ist gelegentlich hier
Registriert
19. August 2010
Beiträge
42
Reaktionspunkte
8
Punkte
28
hallo,

Filesystem Size Used Avail Use% Mounted on
tmpfs 70M 70M 0 100% /var/log

die datei auth.log verbraucht darin den löwenanteil mit 57mb.

kann ich irgendwie einstellen, dass die datei nur 40mb haben darf und danach die ältesten einträge automatisch löscht?

oder kann man die size einfach erhöhen, was ist besser?

lg
 
AW: /var/log 100% used

jo, die /var/log/ipc/OScam.log kann nämlich nicht mehr geschrieben werden, weil alles voll ist
 
AW: /var/log 100% used

logmini sagt mir nichts, wird das automatisch mit ipc mitinstalliert?

soll ich versuchen, diesen befehl aus dem link auszuführen oder kann ich damit eventuell mehr zerstören?
 
AW: /var/log 100% used

Bevor du jetzt überstürzt reagierst, schau doch mal, was denn so in auth.log drin steht.
Bekämpfe lieber dir Ursache, statt der Symptome
 
AW: /var/log 100% used

also scheinbar wird da immer probiert sich einzuloggen, das ist aber ziemlich häufig oder?

auth.log
Feb 6 18:04:09 raspberrypi sshd[10785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:10 raspberrypi sshd[10656]: Failed password for root from 61.174.51.203 port 3606 ssh2
Feb 6 18:04:10 raspberrypi sshd[10656]: Disconnecting: Too many authentication failures for root [preauth]
Feb 6 18:04:10 raspberrypi sshd[10656]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.174.51.203 user=root
Feb 6 18:04:10 raspberrypi sshd[10656]: PAM service(sshd) ignoring max retries; 6 > 3
Feb 6 18:04:11 raspberrypi sshd[10785]: Failed password for invalid user web from 133.242.136.155 port 41581 ssh2
Feb 6 18:04:12 raspberrypi sshd[10785]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:04:14 raspberrypi sshd[10799]: Invalid user web from 133.242.136.155
Feb 6 18:04:14 raspberrypi sshd[10799]: input_userauth_request: invalid user web [preauth]
Feb 6 18:04:14 raspberrypi sshd[10799]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:04:14 raspberrypi sshd[10799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:16 raspberrypi sshd[10799]: Failed password for invalid user web from 133.242.136.155 port 42009 ssh2
Feb 6 18:04:16 raspberrypi sshd[10799]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:04:16 raspberrypi sshd[10775]: reverse mapping checking getaddrinfo for 203.51.174.61.dial.wz.zj.dynamic.163data.com.cn [61.174.51.203] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 6 18:04:17 raspberrypi sshd[10775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.174.51.203 user=root
Feb 6 18:04:18 raspberrypi sshd[10775]: Failed password for root from 61.174.51.203 port 2766 ssh2
Feb 6 18:04:19 raspberrypi sshd[10813]: Invalid user web from 133.242.136.155
Feb 6 18:04:19 raspberrypi sshd[10813]: input_userauth_request: invalid user web [preauth]
Feb 6 18:04:19 raspberrypi sshd[10813]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:04:19 raspberrypi sshd[10813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:20 raspberrypi sshd[10813]: Failed password for invalid user web from 133.242.136.155 port 42405 ssh2
Feb 6 18:04:20 raspberrypi sshd[10775]: Failed password for root from 61.174.51.203 port 2766 ssh2
Feb 6 18:04:21 raspberrypi sshd[10813]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:04:23 raspberrypi sshd[10775]: Failed password for root from 61.174.51.203 port 2766 ssh2
Feb 6 18:04:23 raspberrypi sshd[10827]: Invalid user web from 133.242.136.155
Feb 6 18:04:23 raspberrypi sshd[10827]: input_userauth_request: invalid user web [preauth]
Feb 6 18:04:23 raspberrypi sshd[10827]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:04:23 raspberrypi sshd[10827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:24 raspberrypi sshd[10840]: Connection closed by 127.0.0.1 [preauth]
Feb 6 18:04:25 raspberrypi sshd[10827]: Failed password for invalid user web from 133.242.136.155 port 42807 ssh2
Feb 6 18:04:25 raspberrypi sshd[10775]: Failed password for root from 61.174.51.203 port 2766 ssh2
Feb 6 18:04:25 raspberrypi sshd[10827]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:04:27 raspberrypi sshd[10775]: Failed password for root from 61.174.51.203 port 2766 ssh2
Feb 6 18:04:28 raspberrypi sshd[10848]: Invalid user web from 133.242.136.155
Feb 6 18:04:28 raspberrypi sshd[10848]: input_userauth_request: invalid user web [preauth]
Feb 6 18:04:28 raspberrypi sshd[10848]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:04:28 raspberrypi sshd[10848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:30 raspberrypi sshd[10775]: Failed password for root from 61.174.51.203 port 2766 ssh2
Feb 6 18:04:30 raspberrypi sshd[10775]: Disconnecting: Too many authentication failures for root [preauth]
Feb 6 18:04:30 raspberrypi sshd[10775]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.174.51.203 user=root
Feb 6 18:04:30 raspberrypi sshd[10775]: PAM service(sshd) ignoring max retries; 6 > 3
Feb 6 18:04:30 raspberrypi sshd[10848]: Failed password for invalid user web from 133.242.136.155 port 43212 ssh2
Feb 6 18:04:30 raspberrypi sshd[10848]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:04:33 raspberrypi sshd[10866]: Invalid user web from 133.242.136.155
Feb 6 18:04:33 raspberrypi sshd[10866]: input_userauth_request: invalid user web [preauth]
Feb 6 18:04:33 raspberrypi sshd[10866]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:04:33 raspberrypi sshd[10866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:35 raspberrypi sshd[10866]: Failed password for invalid user web from 133.242.136.155 port 43627 ssh2
Feb 6 18:04:35 raspberrypi sshd[10866]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:04:38 raspberrypi sshd[10882]: Invalid user web from 133.242.136.155
Feb 6 18:04:38 raspberrypi sshd[10882]: input_userauth_request: invalid user web [preauth]
Feb 6 18:04:38 raspberrypi sshd[10882]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:04:38 raspberrypi sshd[10882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:39 raspberrypi sshd[10882]: Failed password for invalid user web from 133.242.136.155 port 44043 ssh2
Feb 6 18:04:40 raspberrypi sshd[10882]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:04:42 raspberrypi sshd[10894]: Invalid user web from 133.242.136.155
Feb 6 18:04:42 raspberrypi sshd[10894]: input_userauth_request: invalid user web [preauth]
Feb 6 18:04:42 raspberrypi sshd[10894]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:04:42 raspberrypi sshd[10894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:42 raspberrypi sshd[10862]: reverse mapping checking getaddrinfo for 203.51.174.61.dial.wz.zj.dynamic.163data.com.cn [61.174.51.203] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb 6 18:04:42 raspberrypi sshd[10862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.174.51.203 user=root
Feb 6 18:04:44 raspberrypi sshd[10894]: Failed password for invalid user web from 133.242.136.155 port 44384 ssh2
Feb 6 18:04:45 raspberrypi sshd[10894]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:04:45 raspberrypi sshd[10862]: Failed password for root from 61.174.51.203 port 2108 ssh2
Feb 6 18:04:47 raspberrypi sshd[10862]: Failed password for root from 61.174.51.203 port 2108 ssh2
Feb 6 18:04:47 raspberrypi sshd[10908]: Invalid user web from 133.242.136.155
Feb 6 18:04:47 raspberrypi sshd[10908]: input_userauth_request: invalid user web [preauth]
Feb 6 18:04:47 raspberrypi sshd[10908]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:04:47 raspberrypi sshd[10908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:49 raspberrypi sshd[10908]: Failed password for invalid user web from 133.242.136.155 port 44821 ssh2
Feb 6 18:04:49 raspberrypi sshd[10862]: Failed password for root from 61.174.51.203 port 2108 ssh2
Feb 6 18:04:49 raspberrypi sshd[10908]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:04:52 raspberrypi sshd[10862]: Failed password for root from 61.174.51.203 port 2108 ssh2
Feb 6 18:04:52 raspberrypi sshd[10922]: Invalid user web from 133.242.136.155
Feb 6 18:04:52 raspberrypi sshd[10922]: input_userauth_request: invalid user web [preauth]
Feb 6 18:04:52 raspberrypi sshd[10922]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:04:52 raspberrypi sshd[10922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:54 raspberrypi sshd[10922]: Failed password for invalid user web from 133.242.136.155 port 45187 ssh2
Feb 6 18:04:54 raspberrypi sshd[10862]: Failed password for root from 61.174.51.203 port 2108 ssh2
Feb 6 18:04:54 raspberrypi sshd[10922]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:04:56 raspberrypi sshd[10862]: Failed password for root from 61.174.51.203 port 2108 ssh2
Feb 6 18:04:56 raspberrypi sshd[10862]: Disconnecting: Too many authentication failures for root [preauth]
Feb 6 18:04:56 raspberrypi sshd[10862]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.174.51.203 user=root
Feb 6 18:04:56 raspberrypi sshd[10862]: PAM service(sshd) ignoring max retries; 6 > 3
Feb 6 18:04:56 raspberrypi sshd[10938]: Invalid user web from 133.242.136.155
Feb 6 18:04:56 raspberrypi sshd[10938]: input_userauth_request: invalid user web [preauth]
Feb 6 18:04:56 raspberrypi sshd[10938]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:04:56 raspberrypi sshd[10938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:04:58 raspberrypi sshd[10938]: Failed password for invalid user web from 133.242.136.155 port 45583 ssh2
Feb 6 18:04:59 raspberrypi sshd[10938]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:05:01 raspberrypi sshd[10954]: Invalid user web from 133.242.136.155
Feb 6 18:05:01 raspberrypi sshd[10954]: input_userauth_request: invalid user web [preauth]
Feb 6 18:05:01 raspberrypi sshd[10954]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:05:01 raspberrypi sshd[10954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:05:01 raspberrypi CRON[10962]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 6 18:05:01 raspberrypi CRON[10963]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 6 18:05:02 raspberrypi CRON[10962]: pam_unix(cron:session): session closed for user root
Feb 6 18:05:02 raspberrypi CRON[10963]: pam_unix(cron:session): session closed for user root
Feb 6 18:05:03 raspberrypi sshd[10954]: Failed password for invalid user web from 133.242.136.155 port 45975 ssh2
Feb 6 18:05:04 raspberrypi sshd[10954]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:05:06 raspberrypi sshd[11011]: Invalid user web from 133.242.136.155
Feb 6 18:05:06 raspberrypi sshd[11011]: input_userauth_request: invalid user web [preauth]
Feb 6 18:05:06 raspberrypi sshd[11011]: pam_unix(sshd:auth): check pass; user unknown
Feb 6 18:05:06 raspberrypi sshd[11011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 6 18:05:08 raspberrypi sshd[11011]: Failed password for invalid user web from 133.242.136.155 port 46376 ssh2
Feb 6 18:05:09 raspberrypi sshd[11011]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 6 18:05:09 raspberrypi sshd[10946]: reverse mapping checking getaddrinfo for 203.51.174.61.dial.wz.zj.dynamic.163data.com.cn [61.174.51.203] failed - POSSIBLE BREAK-IN ATTEMPT!Feb 7 11:54:23 raspberrypi sudo: pam_unix(sudo:session): session opened for user root by pi(uid=0)
Feb 7 11:54:23 raspberrypi sudo: pam_unix(sudo:session): session closed for user root
Feb 7 11:54:24 raspberrypi sshd[28116]: Connection closed by 127.0.0.1 [preauth]
Feb 7 11:54:30 raspberrypi sudo: pi : TTY=pts/0 ; PWD=/var/log/ipc ; USER=root ; COMMAND=/bin/o start
Feb 7 11:54:30 raspberrypi sudo: pam_unix(sudo:session): session opened for user root by pi(uid=0)
Feb 7 11:54:31 raspberrypi sudo: pam_unix(sudo:session): session closed for user root
Feb 7 11:54:33 raspberrypi sshd[27922]: pam_unix(sshd:session): session closed for user pi
Feb 7 11:55:01 raspberrypi CRON[28233]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 11:55:01 raspberrypi CRON[28232]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 11:55:01 raspberrypi CRON[28232]: pam_unix(cron:session): session closed for user root
Feb 7 11:55:02 raspberrypi CRON[28233]: pam_unix(cron:session): session closed for user root
Feb 7 11:56:01 raspberrypi CRON[28403]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 11:56:01 raspberrypi CRON[28404]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 11:56:02 raspberrypi CRON[28403]: pam_unix(cron:session): session closed for user root
Feb 7 11:56:02 raspberrypi CRON[28404]: pam_unix(cron:session): session closed for user root
Feb 7 11:57:01 raspberrypi CRON[28573]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 11:57:01 raspberrypi CRON[28572]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 11:57:02 raspberrypi CRON[28572]: pam_unix(cron:session): session closed for user root
Feb 7 11:57:02 raspberrypi CRON[28573]: pam_unix(cron:session): session closed for user root
Feb 7 11:58:01 raspberrypi CRON[28736]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 11:58:01 raspberrypi CRON[28735]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 11:58:02 raspberrypi CRON[28735]: pam_unix(cron:session): session closed for user root
Feb 7 11:58:02 raspberrypi CRON[28736]: pam_unix(cron:session): session closed for user root
Feb 7 11:59:01 raspberrypi CRON[29010]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 11:59:01 raspberrypi CRON[29011]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 11:59:02 raspberrypi CRON[29010]: pam_unix(cron:session): session closed for user root
Feb 7 11:59:02 raspberrypi CRON[29011]: pam_unix(cron:session): session closed for user root
Feb 7 11:59:24 raspberrypi sshd[29100]: Connection closed by 127.0.0.1 [preauth]
Feb 7 12:00:01 raspberrypi CRON[29181]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 12:00:01 raspberrypi CRON[29180]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 12:00:02 raspberrypi CRON[29180]: pam_unix(cron:session): session closed for user root
Feb 7 12:00:02 raspberrypi CRON[29181]: pam_unix(cron:session): session closed for user root
Feb 7 12:01:01 raspberrypi CRON[29351]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 12:01:02 raspberrypi CRON[29350]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 12:01:02 raspberrypi CRON[29350]: pam_unix(cron:session): session closed for user root
Feb 7 12:01:03 raspberrypi CRON[29351]: pam_unix(cron:session): session closed for user root
Feb 7 12:02:01 raspberrypi CRON[29508]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 12:02:01 raspberrypi CRON[29509]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 12:02:01 raspberrypi CRON[29508]: pam_unix(cron:session): session closed for user root
Feb 7 12:02:02 raspberrypi CRON[29509]: pam_unix(cron:session): session closed for user root
Feb 7 12:02:19 raspberrypi sshd[29583]: Invalid user website from 133.242.136.155
Feb 7 12:02:19 raspberrypi sshd[29583]: input_userauth_request: invalid user website [preauth]
Feb 7 12:02:19 raspberrypi sshd[29583]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:02:19 raspberrypi sshd[29583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:02:21 raspberrypi sshd[29583]: Failed password for invalid user website from 133.242.136.155 port 37099 ssh2
Feb 7 12:02:21 raspberrypi sshd[29583]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:02:24 raspberrypi sshd[29597]: Invalid user website from 133.242.136.155
Feb 7 12:02:24 raspberrypi sshd[29597]: input_userauth_request: invalid user website [preauth]
Feb 7 12:02:24 raspberrypi sshd[29597]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:02:24 raspberrypi sshd[29597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:02:26 raspberrypi sshd[29597]: Failed password for invalid user website from 133.242.136.155 port 37354 ssh2
Feb 7 12:02:26 raspberrypi sshd[29597]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:02:29 raspberrypi sshd[29609]: Invalid user website from 133.242.136.155
Feb 7 12:02:29 raspberrypi sshd[29609]: input_userauth_request: invalid user website [preauth]
Feb 7 12:02:29 raspberrypi sshd[29609]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:02:29 raspberrypi sshd[29609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:02:31 raspberrypi sshd[29609]: Failed password for invalid user website from 133.242.136.155 port 37624 ssh2
Feb 7 12:02:31 raspberrypi sshd[29609]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:02:33 raspberrypi sshd[29617]: Invalid user website from 133.242.136.155
Feb 7 12:02:33 raspberrypi sshd[29617]: input_userauth_request: invalid user website [preauth]
Feb 7 12:02:33 raspberrypi sshd[29617]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:02:33 raspberrypi sshd[29617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:02:36 raspberrypi sshd[29617]: Failed password for invalid user website from 133.242.136.155 port 37872 ssh2
Feb 7 12:02:36 raspberrypi sshd[29617]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:02:38 raspberrypi sshd[29628]: Invalid user website from 133.242.136.155
Feb 7 12:02:38 raspberrypi sshd[29628]: input_userauth_request: invalid user website [preauth]
Feb 7 12:02:38 raspberrypi sshd[29628]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:02:38 raspberrypi sshd[29628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:02:41 raspberrypi sshd[29628]: Failed password for invalid user website from 133.242.136.155 port 38134 ssh2
Feb 7 12:02:41 raspberrypi sshd[29628]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:02:43 raspberrypi sshd[29642]: Invalid user website from 133.242.136.155
Feb 7 12:02:43 raspberrypi sshd[29642]: input_userauth_request: invalid user website [preauth]
Feb 7 12:02:43 raspberrypi sshd[29642]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:02:43 raspberrypi sshd[29642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:02:46 raspberrypi sshd[29642]: Failed password for invalid user website from 133.242.136.155 port 38401 ssh2
Feb 7 12:02:46 raspberrypi sshd[29642]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:02:48 raspberrypi sshd[29656]: Invalid user website from 133.242.136.155
Feb 7 12:02:48 raspberrypi sshd[29656]: input_userauth_request: invalid user website [preauth]
Feb 7 12:02:48 raspberrypi sshd[29656]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:02:48 raspberrypi sshd[29656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:02:51 raspberrypi sshd[29656]: Failed password for invalid user website from 133.242.136.155 port 38655 ssh2
Feb 7 12:02:51 raspberrypi sshd[29656]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:02:53 raspberrypi sshd[29670]: Invalid user website from 133.242.136.155
Feb 7 12:02:53 raspberrypi sshd[29670]: input_userauth_request: invalid user website [preauth]
Feb 7 12:02:53 raspberrypi sshd[29670]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:02:53 raspberrypi sshd[29670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:02:56 raspberrypi sshd[29670]: Failed password for invalid user website from 133.242.136.155 port 38901 ssh2
Feb 7 12:02:56 raspberrypi sshd[29670]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:02:58 raspberrypi sshd[29684]: Invalid user website from 133.242.136.155
Feb 7 12:02:58 raspberrypi sshd[29684]: input_userauth_request: invalid user website [preauth]
Feb 7 12:02:58 raspberrypi sshd[29684]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:02:58 raspberrypi sshd[29684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:01 raspberrypi sshd[29684]: Failed password for invalid user website from 133.242.136.155 port 39153 ssh2
Feb 7 12:03:01 raspberrypi CRON[29699]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 12:03:01 raspberrypi CRON[29698]: pam_unix(cron:session): session opened for user root by (uid=0)
Feb 7 12:03:01 raspberrypi sshd[29684]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:03:01 raspberrypi CRON[29698]: pam_unix(cron:session): session closed for user root
Feb 7 12:03:02 raspberrypi CRON[29699]: pam_unix(cron:session): session closed for user root
Feb 7 12:03:03 raspberrypi sshd[29720]: Invalid user website from 133.242.136.155
Feb 7 12:03:03 raspberrypi sshd[29720]: input_userauth_request: invalid user website [preauth]
Feb 7 12:03:04 raspberrypi sshd[29720]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:03:04 raspberrypi sshd[29720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:05 raspberrypi sshd[29720]: Failed password for invalid user website from 133.242.136.155 port 39402 ssh2
Feb 7 12:03:06 raspberrypi sshd[29720]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:03:08 raspberrypi sshd[29755]: Invalid user website from 133.242.136.155
Feb 7 12:03:08 raspberrypi sshd[29755]: input_userauth_request: invalid user website [preauth]
Feb 7 12:03:08 raspberrypi sshd[29755]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:03:08 raspberrypi sshd[29755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:10 raspberrypi sshd[29755]: Failed password for invalid user website from 133.242.136.155 port 39636 ssh2
Feb 7 12:03:10 raspberrypi sshd[29755]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:03:12 raspberrypi sshd[29769]: Invalid user website from 133.242.136.155
Feb 7 12:03:12 raspberrypi sshd[29769]: input_userauth_request: invalid user website [preauth]
Feb 7 12:03:12 raspberrypi sshd[29769]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:03:12 raspberrypi sshd[29769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:15 raspberrypi sshd[29769]: Failed password for invalid user website from 133.242.136.155 port 39859 ssh2
Feb 7 12:03:15 raspberrypi sshd[29769]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:03:18 raspberrypi sshd[29783]: Invalid user website from 133.242.136.155
Feb 7 12:03:18 raspberrypi sshd[29783]: input_userauth_request: invalid user website [preauth]
Feb 7 12:03:18 raspberrypi sshd[29783]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:03:18 raspberrypi sshd[29783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:19 raspberrypi sshd[29783]: Failed password for invalid user website from 133.242.136.155 port 40115 ssh2
Feb 7 12:03:20 raspberrypi sshd[29783]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:03:22 raspberrypi sshd[29795]: Invalid user website from 133.242.136.155
Feb 7 12:03:22 raspberrypi sshd[29795]: input_userauth_request: invalid user website [preauth]
Feb 7 12:03:22 raspberrypi sshd[29795]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:03:22 raspberrypi sshd[29795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:24 raspberrypi sshd[29795]: Failed password for invalid user website from 133.242.136.155 port 40342 ssh2
Feb 7 12:03:24 raspberrypi sshd[29795]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:03:27 raspberrypi sshd[29809]: Invalid user website from 133.242.136.155
Feb 7 12:03:27 raspberrypi sshd[29809]: input_userauth_request: invalid user website [preauth]
Feb 7 12:03:27 raspberrypi sshd[29809]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:03:27 raspberrypi sshd[29809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:29 raspberrypi sshd[29809]: Failed password for invalid user website from 133.242.136.155 port 40568 ssh2
Feb 7 12:03:29 raspberrypi sshd[29809]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:03:32 raspberrypi sshd[29823]: Invalid user website from 133.242.136.155
Feb 7 12:03:32 raspberrypi sshd[29823]: input_userauth_request: invalid user website [preauth]
Feb 7 12:03:32 raspberrypi sshd[29823]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:03:32 raspberrypi sshd[29823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:34 raspberrypi sshd[29823]: Failed password for invalid user website from 133.242.136.155 port 40825 ssh2
Feb 7 12:03:34 raspberrypi sshd[29823]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:03:37 raspberrypi sshd[29840]: Invalid user website from 133.242.136.155
Feb 7 12:03:37 raspberrypi sshd[29840]: input_userauth_request: invalid user website [preauth]
Feb 7 12:03:37 raspberrypi sshd[29840]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:03:37 raspberrypi sshd[29840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:39 raspberrypi sshd[29840]: Failed password for invalid user website from 133.242.136.155 port 41072 ssh2
Feb 7 12:03:40 raspberrypi sshd[29840]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:03:42 raspberrypi sshd[29856]: Invalid user website from 133.242.136.155
Feb 7 12:03:42 raspberrypi sshd[29856]: input_userauth_request: invalid user website [preauth]
Feb 7 12:03:42 raspberrypi sshd[29856]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:03:42 raspberrypi sshd[29856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:44 raspberrypi sshd[29856]: Failed password for invalid user website from 133.242.136.155 port 41329 ssh2
Feb 7 12:03:44 raspberrypi sshd[29856]: Received disconnect from 133.242.136.155: 11: Bye Bye [preauth]
Feb 7 12:03:46 raspberrypi sshd[29870]: Invalid user website from 133.242.136.155
Feb 7 12:03:46 raspberrypi sshd[29870]: input_userauth_request: invalid user website [preauth]
Feb 7 12:03:47 raspberrypi sshd[29870]: pam_unix(sshd:auth): check pass; user unknown
Feb 7 12:03:47 raspberrypi sshd[29870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www1141uj.sakura.ne.jp
Feb 7 12:03:49 raspberrypi sshd[29870]: Failed password for invalid uFeb 10 18:58:18 raspberrypi sshd[17012]: Connection closed by 218.57.146.189 [preauth]
Feb 10 18:58:20 raspberrypi sshd[17026]: Invalid user zsofia from 218.57.146.189
Feb 10 18:58:20 raspberrypi sshd[17026]: input_userauth_request: invalid user zsofia [preauth]
Feb 10 18:58:21 raspberrypi sshd[17026]: pam_unix(sshd:auth): check pass; user unknown
Feb 10 18:58:21 raspberrypi sshd[17026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.57.146.189
Feb 10 18:58:22 raspberrypi sshd[17026]: Failed password for invalid user zsofia from 218.57.146.189 port 38521 ssh2
Feb 10 18:58:23 raspberrypi sshd[17026]: Connection closed by 218.57.146.189 [preauth]
Feb 10 18:58:26 raspberrypi sshd[17051]: Invalid user zsofika from 218.57.146.189
Feb 10 18:58:26 raspberrypi sshd[17051]: input_userauth_request: invalid user zsofika [preauth]
Feb 10 18:58:26 raspberrypi sshd[17051]: pam_unix(sshd:auth): check pass; user unknown
Feb 10 18:58:26 raspberrypi sshd[17051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.57.146.189
Feb 10 18:58:28 raspberrypi sshd[17051]: Failed password for invalid user zsofika from 218.57.146.189 port 21686 ssh2
Feb 10 18:58:29 raspberrypi sshd[17051]: Connection closed by 218.57.146.189 [preauth]
Feb 10 18:58:33 raspberrypi sshd[17061]: Invalid user zsoka from 218.57.146.189
Feb 10 18:58:33 raspberrypi sshd[17061]: input_userauth_request: invalid user zsoka [preauth]
Feb 10 18:58:33 raspberrypi sshd[17061]: pam_unix(sshd:auth): check pass; user unknown
Feb 10 18:58:33 raspberrypi sshd[17061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.57.146.189
Feb 10 18:58:34 raspberrypi sshd[17061]: Failed password for invalid user zsoka from 218.57.146.189 port 61935 ssh2
Feb 10 18:58:35 raspberrypi sshd[17061]: Connection closed by 218.57.146.189 [preauth]
Feb 10 18:58:37 raspberrypi sshd[17082]: Invalid user zsuska from 218.57.146.189
Feb 10 18:58:37 raspberrypi sshd[17082]: input_userauth_request: invalid user zsuska [preauth]
Feb 10 18:58:37 raspberrypi sshd[17082]: pam_unix(sshd:auth): check pass; user unknown
Feb 10 18:58:37 raspberrypi sshd[17082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.57.146.189
Feb 10 18:58:39 raspberrypi sshd[17082]: Failed password for invalid user zsuska from 218.57.146.189 port 30042 ssh2
Feb 10 18:58:39 raspberrypi sshd[17082]: Connection closed by 218.57.146.189 [preauth]
Feb 10 18:58:42 raspberrypi sshd[17100]: Invalid user zsusko from 218.57.146.189
Feb 10 18:58:42 raspberrypi sshd[17100]: input_userauth_request: invalid user zsusko [preauth]
Feb 10 18:58:42 raspberrypi sshd[17100]: pam_unix(sshd:auth): check pass; user unknown
Feb 10 18:58:42 raspberrypi sshd[17100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.57.146.189
Feb 10 18:58:44 raspberrypi sshd[17100]: Failed password for invalid user zsusko from 218.57.146.189 port 21023 ssh2
Feb 10 18:58:45 raspberrypi sshd[17100]: Connection closed by 218.57.146.189 [preauth]
Feb 10 18:58:47 raspberrypi sshd[17115]: Invalid user zsuzsa from 218.57.146.189
Feb 10 18:58:47 raspberrypi sshd[17115]: input_userauth_request: invalid user zsuzsa [preauth]
Feb 10 18:58:47 raspberrypi sshd[17115]: pam_unix(sshd:auth): check pass; user unknown
Feb 10 18:58:47 raspberrypi sshd[17115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.57.146.189
Feb 10 18:58:50 raspberrypi sshd[17115]: Failed password for invalid user zsuzsa from 218.57.146.189 port 61465 ssh2
Feb 10 18:58:50 raspberrypi sshd[17115]: Connection closed by 218.57.146.189 [preauth]
Feb 10 18:58:53 raspberrypi sshd[17129]: Invalid user zsuzsanna from 218.57.146.189
Feb 10 18:58:53 raspberrypi sshd[17129]: input_userauth_request: invalid user zsuzsanna [preauth]
Feb 10 18:58:53 raspberrypi sshd[17129]: pam_unix(sshd:auth): check pass; user unknown

i info
IPC Informations 26.02.2014 14:22
===============================================================================

IPC Version: 11.5 Build: 2013-05-29
Available Update: 11.5 Build: 2014-01-07

System is: 32-Bit Kernel: 3.6.11+ #557 PREEMPT Wed Oct 2 18:49:09 BST 2013

Installed Cams (running/not running):

cccam version: <unknown>
oscam version: oscam-1.20-unstable_svn-r9524 uptime: 6 days, 4 hours, 31 minutes, 42 seconds

Installed Addons:
tmp2ram.sh installed at: 2013-10-24 12:36
logmini.sh installed at: 2013-10-24 12:36
 
AW: /var/log 100% used

Da versucht die ganze Zeit jemand von Außen auf dein System zu kommenn. Ich würde mal über iptables die IP blocken und schon hast du Ruhe.
Welche Ports hast du denn nach außen offen? Standard Ports?
 
AW: /var/log 100% used

ja, ich bin wahrscheinnlich selbst schuld, weil ich den ssh port offen habe.

ist wahrscheinlich besser, wenn ich nach außen einen anderen aufmache und den dann intern zum ssh port weiterleite

das mit den iptables werde ich mir mal durchlesen, habe da noch nichts konfiguriert
 
AW: /var/log 100% used

Ja nach außen sollte es ein anderer Port als 22 sein. Am besten im 60000er Bereich, damit er auch bei Portscans schwer zu finden ist.
Ja auf fail2ban solltest auch mal ein Auge werfen. Um dir mal wieder Luft zu verschaffen dann auch mal die auth.log löschen.
 
AW: /var/log 100% used

danke, habe jetzt mal den port auf einen 5-stelligen wert geändert

gibt es eigentlich einen befehl um den inhalt der auth.log zu löschen oder löscht man da die ganze datei und nach einem reset wird sie wieder erstellt?
 
AW: /var/log 100% used

Du kannst sie über das WebIf von IPC löschen. Einfach auth.log unter Logs auswählen und auf das kleine Rote Kreuz neben Show klicken
 
AW: /var/log 100% used

bin leider nicht zuhause und auf das webif von ipc kommt man extern glaube ich nicht

gibts über putty keine möglichkeit?
 
Zurück
Oben