On Fri, 30 Mar 2007, John Summerfield wrote:

> Gregg Levine wrote:
>
> > David, your assertion that would take 37 seconds for some pest to
> > promptly try to annoy the site that Stephen Frazier configured is
> > indeed fact. Not too long ago I brought a new Slackware (Intel) system
> > online for some development work, and since I had the SSH port open
> > for other purposes, some idiot promptly found it and was rubbing the
> > penguin the wrong way.
>
> I use tcpwrappers to restrict access to my ssh port to those regions of
> the world where I might be (Western Australia). I've found some minor
> discrepancies, but it's pretty rare these days that someone uses it to
> enumerate my login accounts.
>
> Firewall rules would do about as well.

Try denyhosts also... very handly little program that detects bruteforce
attempts and adds the offending host to /etc/hosts.deny.

Enjoy,
Scott

>
>
> --
>
> Cheers
> John
>
> -- spambait
> [EMAIL PROTECTED]  [EMAIL PROTECTED]
>
> Please do not reply off-list
>
> ----------------------------------------------------------------------
> For LINUX-390 subscribe / signoff / archive access instructions,
> send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
> http://www.marist.edu/htbin/wlvindex?LINUX-390
>

sleekfreak pirate broadcast
http://sleekfreak.ath.cx:81/

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to