You can use iptable to simple block anything that starts to try and brute force the system.
Here is an older but still applicable article on setting up IPTables to do this http://kevin.vanzonneveld.net/techblog/article/block_brute_force_attacks_with_iptables/ On Jun 26, 2012 3:40 PM, "Ragi Burhum" <r...@burhum.com> wrote: > So now that I manage 10+ servers our in the wild, and I had time to look > at my /var/log/auth.log, I think it is about time I start rsyncing > blacklists somehow.... > > What lists do you subscribe to and what Ubuntu package do you recommend > for keeping blacklists nicely updated? > > _______________________________________________ > LinuxUsers mailing list > LinuxUsers@socallinux.org > http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers > >
_______________________________________________ LinuxUsers mailing list LinuxUsers@socallinux.org http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers