Daniel Aeberli wrote:
> Thanks Kristian, > > Once I block the attacks, maybe I'll see the real problem in the status > screen. > > Cheers > > > Maybe moving to key based SSH authentication instead of password would help mitigate the problem, I think. When the person connects it should drop the connection immediately since they don't have the proper key. It's worth a try. I also know of the following scripts that run from CRON and monitor the SSH logs and after X number of failed logins the IP gets dropped never to be seen from your router again :) http://www.webhostgear.com/61.html and http://www.webhostgear.com/60.html As long as AstLinux is using iptables I can't think of why these two scripts wouldn't be a nice automated solution. I'd run a script every X number of days to clear out the APF deny_hosts.rules file otherwise it can grow to be rather large and on a small embedded device I can see this being an issue. Hope one of these helps. -- Jon www.VoIPmogul.com ------------------------------------------------------------------------- This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Astlinux-users mailing list Astlinux-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/astlinux-users Donations to support AstLinux are graciously accepted via PayPal to [EMAIL PROTECTED]