What Do I Do If the Account Cracking Prevention Function Does Not Take Effect on Some Accounts for Linux Servers?
Possible Causes
The SSHD service in the host system does not depend on libwrap.so.
As a free software library, libwrap implements the universal TCP Wrapper function. Any daemon that contains libwrap.so can use the rules in files /etc/hosts.allow and /etc/hosts.deny to perform simple access control on the host.
Solution
Log in to the server and install the HSS agent. Then run the following command:
sh /usr/local/hostguard/conf/config_ssh_xinetd.sh.
Affected Image Versions
- The following are Gentoo images that have the problem:
- Gentoo Linux 17.0 64bit (40 GB)
- Gentoo Linux 13.0 64bit (40 GB)
- The following are OpenSUSE images that have the problem:
- OpenSUSE 42.2 64bit (40 GB)
- OpenSUSE 13.2 64bit (40 GB)
Brute-force Attack Defense FAQs
- How Does HSS Intercept Brute Force Attacks?
- How Do I Handle a Brute-force Attack Alarm?
- How Do I Defend Against Brute-force Attacks?
- What Do I Do If the Account Cracking Prevention Function Does Not Take Effect on Some Accounts for Linux Servers?
- How Do I Unblock an IP Address?
- What Do I Do If HSS Frequently Reports Brute-force Alarms?
- How Do I Handle Alarms on the Brute-Force Attacks Launched from a Huawei Cloud IP Address?
- What Do I Do If My Remote Server Port Is Not Updated in Brute-force Attack Records?
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbotmore