Daniel Aeberli wrote:

  

> Thanks Kristian,
>
> Once I block the attacks, maybe I'll see the real problem in the status 
> screen.
>
> Cheers
>
>
>   
Maybe moving to key based SSH authentication instead of password would 
help mitigate the problem, I think. When the person connects it should 
drop the connection immediately since they don't have the proper key. 
It's worth a try.

I also know of the following scripts that run from CRON and monitor the 
SSH logs and after X number of failed logins the IP gets dropped never 
to be seen from your router again :)

http://www.webhostgear.com/61.html
and
http://www.webhostgear.com/60.html

As long as AstLinux is using iptables I can't think of why these two 
scripts wouldn't be a nice automated solution. I'd run a script every X 
number of days to clear out the APF deny_hosts.rules file otherwise it 
can grow to be rather large and on a small embedded device I can see 
this being an issue.

Hope one of these helps.

-- 
Jon
www.VoIPmogul.com


-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
Astlinux-users mailing list
Astlinux-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/astlinux-users

Donations to support AstLinux are graciously accepted via PayPal to [EMAIL 
PROTECTED]

Reply via email to