You can use iptable to simple block anything that starts to try and brute
force the system.

Here is an older but still applicable article on setting up IPTables to do
this

http://kevin.vanzonneveld.net/techblog/article/block_brute_force_attacks_with_iptables/
On Jun 26, 2012 3:40 PM, "Ragi Burhum" <r...@burhum.com> wrote:

> So now that I manage 10+ servers our in the wild, and I had time to look
> at my /var/log/auth.log, I think it is about time I start rsyncing
> blacklists somehow....
>
> What lists do you subscribe to and what Ubuntu package do you recommend
> for keeping blacklists nicely updated?
>
> _______________________________________________
> LinuxUsers mailing list
> LinuxUsers@socallinux.org
> http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers
>
>
_______________________________________________
LinuxUsers mailing list
LinuxUsers@socallinux.org
http://socallinux.org/cgi-bin/mailman/listinfo/linuxusers

Reply via email to