On Fri, 30 Mar 2007, John Summerfield wrote: > Gregg Levine wrote: > > > David, your assertion that would take 37 seconds for some pest to > > promptly try to annoy the site that Stephen Frazier configured is > > indeed fact. Not too long ago I brought a new Slackware (Intel) system > > online for some development work, and since I had the SSH port open > > for other purposes, some idiot promptly found it and was rubbing the > > penguin the wrong way. > > I use tcpwrappers to restrict access to my ssh port to those regions of > the world where I might be (Western Australia). I've found some minor > discrepancies, but it's pretty rare these days that someone uses it to > enumerate my login accounts. > > Firewall rules would do about as well.
Try denyhosts also... very handly little program that detects bruteforce attempts and adds the offending host to /etc/hosts.deny. Enjoy, Scott > > > -- > > Cheers > John > > -- spambait > [EMAIL PROTECTED] [EMAIL PROTECTED] > > Please do not reply off-list > > ---------------------------------------------------------------------- > For LINUX-390 subscribe / signoff / archive access instructions, > send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit > http://www.marist.edu/htbin/wlvindex?LINUX-390 > sleekfreak pirate broadcast http://sleekfreak.ath.cx:81/ ---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit http://www.marist.edu/htbin/wlvindex?LINUX-390
