Nick Demou wrote:
> Any other idea of simple measures that will keep as many attackers 
> away from the one and only service that is listening to the Internet?

Different approach, but the same goal:

aptitude install fail2ban

> bans IPs that cause multiple authentication
> errors Monitors log files (e.g. /var/log/auth.log,
> /var/log/apache/access.log) and temporarily or persistently bans
> failure-prone addresses by updating existing firewall rules. The
> software was completely rewritten ▒ at version 0.7.0 and now allows
> easy specification of different actions to be taken such as to ban an
> IP▒ using iptables or hostsdeny rules, or simply to send a
> notification email. Currently, by default,       ▒ supports
> ssh/apache/vsftpd but configuration can be easily extended for
> monitoring any other ASCII file.▒ All filters and actions are given
> in the config files, thus fail2ban can be adopted to be used with a
> ▒ variety of files and firewalls.
> ▒ ▒ Homepage: http://www.sourceforge.net/projects/fail2ban

Maybe not as perfect as your approach, but very simple: just install and
forget.

Johannes


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to