On 10/10/2008, at 10:58 AM, Daniel Pittman wrote:

Personally, I use fail2ban[1] which uses the cruder, but still
effective, technique of reading your logs and blocking people who try to
guess passwords via iptables.


I use with great success an iptables rule to limit new ssh connections to 2 or 3 a minute, brute forcers will get a few attempts, then timeout and move
on.

--

http://chesterton.id.au/blog/
http://barrang.com.au/


--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to