Tim Alberts wrote:
So I setup ssh on a server so I could do some work from home and I think the second I opened it every sorry monkey from around the world has been trying every account name imaginable to get into the system.

What's a good way to deal with this?

_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

You could consider to disallow password access.
Use only public key authentication. The "attacks" will remain, but can never succeed. (The scripts are not smart so they keep trying for hours sometimes)

sshd_config:
PasswordAuthentication no

Now create a public/private ssh keypair and put the public key in ~/.ssh/authorized_keys on the remote machine.

# local machine*
ssh-keygen -t dsa*

*scp** ~/.ssh/id_dsa.pub  remote_host:.ssh/authorized_keys

*# remote host*
**chmod 600 ~/.ssh/authorized_keys
chmod 700 ~/.ssh
*

To be really save, only allow access from a limited number of IP addresses:

**

cat ~/.ssh/authorized_keys
from="123.345.133.123,home.com,work.com" ssh-dss AAAAB3NzaC1kc3MA<snip>AqNY= [EMAIL PROTECTED]

Theo
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to