I've been using fail2ban to deal with remote brute force attacks and it
works like a charm. .. . So far anyway :-)



On Fri, Dec 2, 2011 at 5:34 PM, Andrew J. Kopciuch <[email protected]>wrote:

> On December 2, 2011, Royce Souther wrote:
> > If you watch TechSNAP it has more information.
> >
> http://www.jupiterbroadcasting.com/14561/allans-zfs-server-build-techsnap-3
> >4/
> >
> > PKI may not be enough, I am thinking that port knocking to restrict
> access
> > to port 22 is a good idea now.
>
> I believe the exploits were not 0-day, but rather a brute force attack
> using
> the root account.
>
> As Gustin pointed out, the versions were very very old, and should have
> been
> patched.   Additionally setting "PermitRootLogin no" in sshd_config would
> have been a good thing.
>
> Also, some sort of HIDS like ossec (http://www.ossec.net).  It has an
> active-response which will block the IPs using ipables from brute force
> attacks detected.
>
>
> Andy
>
> _______________________________________________
> clug-talk mailing list
> [email protected]
> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
> **Please remove these lines when replying
>



-- 
One thing you can be sure of. If you throw a loaded gun in a monkey cage,
something bad is going to happen.
_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to