Three things you should do:

1. Run OSSEC HIDS (I do this on my servers as well as those at http://www.greenesthost.com) with a firewall. In my case, we have hardware (HW) firewalls on the network as well as software (SW) firewalls on the local machine. The HW firewalls are configured to only have those ports open that need to be open to the Internet (ssh, http, https, ftp, etc). The software firewalls are either configured the same way with additional ports open for internal network communication, or are left generally wide open. OSSEC interfaces with the software firewall to monitor intrusions and immediately block the offending IPs. I also have it monitoring my mail logs in order to block spammers from connecting at all. With OSSEC running, I don't even worry about successful attacks on my servers. (http://www.ossec.net/, http://ubuntuforums.org/showthread.php?t=213445)

2. Install mod_security in Apache. This will help block specific attacks on your web server. (http://www.howtoforge.com/apache_mod_security)

3. Have sshd listen on a different port. This will get rid of 99% of ssh attacks.

Hope this helps.

PGA
--
Paul G. Allen, BSIT/SE
Owner, Sr. Engineer
Random Logic Consulting
http://www.randomlogic.com


--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to