Quoting "Paul G. Allen" <[EMAIL PROTECTED]>:

I'm not a big fan of DenyHosts because I'm not sure the whole idea was thought out that well. It works okay under small load (at which point I probably don't need it), but I wonder how it would fare under real attack.
A couple of reasons why I use OSSEC. it can be configured to block an IP after x number of incorrect login attempts, block for x amount of time or indefinitely, monitor multiple services, and send alerts for various levels of severity. It also works well under load.

I know a big "solaris is the only true OS" person that, for some reason, had setup a system ages ago to use routing vs ip filtering to block people that probed or did too many ssh attempts, and never bothered to convert it to ip filtering eventually. Worked great until he had about 64k routing entries for specific hosts to null. That one made me chuckle.. because every single packet that ever entered or left the box had to parse the entire routing ruleset he'd built up over time.

--
Mike Marion-Unix/Linux Admin-http://www.miguelito.org
Do not meddle in the affairs of sysadmins, for they are easy to annoy and have
the root password.


--
KPLUG-List@kernel-panic.org
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to