Not AMD64 specific, but I use the following iptables script:

#!/bin/sh
# Start fresh
iptables -F

# Deal with SSH connections.
iptables -N sshchain
iptables -N sshscan

# Do the block
iptables -A INPUT -i eth0 -p tcp -m tcp --dport 22 -j sshchain
iptables -A sshchain -m conntrack --ctstate NEW -m recent --name sshattempts 
--set
iptables -A sshchain -m recent --rcheck --seconds 60 --hitcount 10 --name 
sshattempts --rsource -j sshscan

# log when it happens, 
iptables -A sshscan -m recent --rcheck --hitcount 3 --seconds 600 -j LOG 
--log-prefix "SSH to many: "
iptables -A sshscan -j DROP
##################

It blocks all IPs that make more than 10 SSH connect attempts per
minute.  This is more than generous because my most forgetful
legitimate user only manages two or three failures total per login
attempt.  But, it is enough to dramatically reduce the amount of
nefarious failures.

-Brett.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to