David G. Miller wrote:

> Rainer Traut <tr.ml@...> writes:
> 
>> Hi,
>>
>> to prevent scripted dictionary attacks to sshd
>> I applied those iptables rules:
> SNIP
> 
> Lots of good advice from several people.  All of the suggested solutions mean
> you still have to wade through log entries from the unsuccessful attacks.  
> 
> I've been quite happy with similar IP tables rules but I moved sshd to listen 
> on
> something other than port 22 for external connections.  I haven't seen a 
> single
> brute force attack since making the move and all unsuccessful attempts to 
> login
> via ssh get logged so it's not like attackers can stay below my radar.
> 
> It seems that the script kiddies who are responsible for most of these attacks
> don't bother scanning (nmap) before the attack.  If port 22 isn't open they 
> move
> elsewhere.  If I ever see any failed login attempts I can assume that the
> perpetrator is at least a little more skilled than usual and possibly take
> additional action.
> 
> Cheers,
> Dave
> 

I use Denyhosts for my security. All attacking IP's are blocked 
automatically and sent to Denyhosts database server. Those IP's, from 
around the world are then shared amongst all denyhosts users/systems, so 
   I am already protected from IP's attacking others.

Ljubomir
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to