Tim Alberts wrote:
So I setup ssh on a server so I could do some work from home and I
think the second I opened it every sorry monkey from around the world
has been trying every account name imaginable to get into the system.
What's a good way to deal with this?
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos
You could consider to disallow password access.
Use only public key authentication. The "attacks" will remain, but can
never succeed. (The scripts are not smart so they keep trying for hours
sometimes)
sshd_config:
PasswordAuthentication no
Now create a public/private ssh keypair and put the public key in
~/.ssh/authorized_keys on the remote machine.
# local machine*
ssh-keygen -t dsa*
*scp** ~/.ssh/id_dsa.pub remote_host:.ssh/authorized_keys
*# remote host*
**chmod 600 ~/.ssh/authorized_keys
chmod 700 ~/.ssh
*
To be really save, only allow access from a limited number of IP addresses:
**
cat ~/.ssh/authorized_keys
from="123.345.133.123,home.com,work.com" ssh-dss
AAAAB3NzaC1kc3MA<snip>AqNY= my@email
Theo
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos