Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
PostPosted: Mon Dec 07, 2009 8:05 am 
Offline
Junior Member

Joined: Fri Jan 02, 2009 9:11 am
Posts: 36
I am seeing a pretty constant stream of traffic on my network graphs to my sql server linode. Its running mysql and has no web server or anything else on it.

Image

The traffic is not from my web server as they is hardly any activity on it currently, is there a way to identify where the traffic is coming from?


Top
   
 Post subject:
PostPosted: Mon Dec 07, 2009 8:11 am 
Offline
Senior Member

Joined: Mon Dec 07, 2009 6:46 am
Posts: 331
SSH to your sql-001 linode and try some netstat magic, for instance netstat --inet will show you current connections.

Do you have a firewall allowing only intranet traffic? Did you configure MySQL to listen only at intranet IPs?

Also, instructing the firewall to log activities will give you a better picture as well.


Top
   
 Post subject:
PostPosted: Mon Dec 07, 2009 8:25 am 
Offline
Junior Member

Joined: Fri Jan 02, 2009 9:11 am
Posts: 36
I have the server setup with only mysql connections allowed from the web server ip address.

Looking at the netstat output

Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 sql-001:ssh ip-174-142-75-230:43221 ESTABLISHED

There is another entry which is for me, looks like some one if trying to log onto the server via SSH.

Would fail2ban stop these sort of attacks? I don't have a static IP address at home so cant lock SSH to a specific IP.


Top
   
 Post subject:
PostPosted: Mon Dec 07, 2009 8:41 am 
Offline
Junior Member

Joined: Fri Jan 02, 2009 9:11 am
Posts: 36
Just installed fail2ban and the connections have dropped right off.

Thanks for the help Azathoth


Top
   
 Post subject:
PostPosted: Mon Dec 07, 2009 8:42 am 
Offline
Senior Member

Joined: Mon Dec 07, 2009 6:46 am
Posts: 331
Just move SSH to another port, use public key authentication and you don't need fail2ban, you'll be safer anyways.


Top
   
 Post subject:
PostPosted: Mon Dec 07, 2009 11:38 am 
Offline
Senior Member
User avatar

Joined: Tue May 26, 2009 3:29 pm
Posts: 1691
Location: Montreal, QC
Azathoth wrote:
Just move SSH to another port, use public key authentication and you don't need fail2ban, you'll be safer anyways.


Changing your SSH port doesn't make you any safer.


Top
   
 Post subject:
PostPosted: Mon Dec 07, 2009 11:41 am 
Offline
Senior Member

Joined: Sat May 03, 2008 4:01 pm
Posts: 569
Website: http://www.mattnordhoff.com/
Guspaz wrote:
Changing your SSH port doesn't make you any safer.


But it does save you some CPU and log spam.


Top
   
 Post subject:
PostPosted: Mon Dec 07, 2009 11:44 am 
Offline
Senior Member

Joined: Mon Dec 07, 2009 6:46 am
Posts: 331
Guspaz wrote:
Changing your SSH port doesn't make you any safer.


It does actually, it makes your SSH invisible to automated bruteforce bots.

But my whole sentence was using pubkey auth (and SSH on different port) that makes it (significantly) safer.


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: nqservices and 7 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group