question on hosts.allow

2006-12-21 Thread David Banning
I have been running denyhosts to stop attacks on my ssh port. The attacks continue after protection is put in place. Here is what I have in the tail of my /etc/hosts.allow as per the installation instructions; - ...snip sshd : /etc/hosts.deniedssh : deny sshd : ALL :

Re: question on hosts.allow

2006-12-21 Thread Derek Ragona
I can't say if it will read your other file, I use explicit lines such as: sshd: 192.168.1.20 : allow sshd: 82.165.182.220 : deny sshd: ALL: DENY This allows ONLY access from good known IP's. You will still see the attempts in the security logs. -Derek At 11:04 PM 12/20/2006,

Re: question on hosts.allow

2006-12-21 Thread Daniel Bye
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 David Banning wrote: I have been running denyhosts to stop attacks on my ssh port. The attacks continue after protection is put in place. Here is what I have in the tail of my /etc/hosts.allow as per the installation instructions;

Re: question on hosts.allow

2006-12-21 Thread Marwan Sultan
Hello, Well, You will always see the attempts in security logs. As Derek Wrote, you have to allow your IP and deny the rest. Also, you may set in /etc/ssh/sshd_config a line in the bottom of the file which reads AllowUsers YOUR_USER_HERE In this case, you will make sure your ip