On 10/10/2008, at 10:58 AM, Daniel Pittman wrote:
Personally, I use fail2ban[1] which uses the cruder, but still
effective, technique of reading your logs and blocking people who
try to
guess passwords via iptables.
I use with great success an iptables rule to limit new ssh connections
to
2 or 3 a minute, brute forcers will get a few attempts, then timeout
and move
on.
--
http://chesterton.id.au/blog/
http://barrang.com.au/
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html