RE: SSH2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



There's a tool called portsentry that works pretty well on some of these things.  You can set up its sensitivity to certain events & it will drop (l)users into hosts.deny and also much your ipchains to drop anything from that source into your bit bucket, so it appears that you just fell off the earth.  Of course, the routes get reset on power cycles & so forth (or in my case, I rerun my firewall script every midnight to flush out all the rules & reload)
 
    -Tom

-----Original Message-----
From: redhat-list-bounces@xxxxxxxxxx [mailto:redhat-list-bounces@xxxxxxxxxx]On Behalf Of Chris W. Parker
Sent: Tuesday, April 05, 2005 6:43 PM
To: General Red Hat Linux discussion list
Subject: RE: SSH2



David Tonhofer, m-plify S.A. < mailto:d.tonhofer@xxxxxxxxxxx> 
    on Tuesday, April 05, 2005 1:37 PM said: 

> I don't think so, I have a few thousand attempts with various vanilla 
> users each day on each machine. Tiresome. I think SSH should tarpit 
> the connections, I have already an itch to fix the source.... 

So this happens to everyone huh? That's good to know. 

So then as long as software is up to date and strong passwords are used, 
I guess there's not much to worry about then? 

I wonder why though the firewall (iptables) doesn't automatically block 
ip addresses after say 20 failed attempts? Is this possible? 



Chris. 

-- 
redhat-list mailing list 
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe 
https://www.redhat.com/mailman/listinfo/redhat-list 

-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subjecthttps://www.redhat.com/mailman/listinfo/redhat-list


[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux