Lukasz Hejnak wrote:
> Well my way of solving this was to change the
default port for the ssh
> service to some high port, anyway !=22 which is the
default in most of
> the scans/attacks.

I'll second the port change approach.  I started
noticing all the brute force attempts in my server's
logs many months ago and set up firewall rules using
the 'recent' module to block an IP after 3 failed SSH
connection attempts within one minute.  It worked, but
I still found all the log entries annoying, so I tried
changing sshd to listen on a non-standard port.  Since
then I haven't seen a single failed login attempt in
the logs, making auditing them again trivial.



        
                
__________________________________ 
Yahoo! Mail - PC Magazine Editors' Choice 2005 
http://mail.yahoo.com
-- 
http://linuxfromscratch.org/mailman/listinfo/lfs-security
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to