I have been running denyhosts to stop attacks on my ssh port.
The attacks continue after protection is put in place.
Here is what I have in the tail of my /etc/hosts.allow
as per the installation instructions;
-
...snip
sshd : /etc/hosts.deniedssh : deny
sshd : ALL :
I can't say if it will read your other file, I use explicit lines such as:
sshd: 192.168.1.20 : allow
sshd: 82.165.182.220 : deny
sshd: ALL: DENY
This allows ONLY access from good known IP's. You will still see the
attempts in the security logs.
-Derek
At 11:04 PM 12/20/2006,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
David Banning wrote:
I have been running denyhosts to stop attacks on my ssh port.
The attacks continue after protection is put in place.
Here is what I have in the tail of my /etc/hosts.allow
as per the installation instructions;
Hello,
Well, You will always see the attempts in security logs.
As Derek Wrote, you have to allow your IP and deny the rest.
Also, you may set in /etc/ssh/sshd_config
a line in the bottom of the file which reads
AllowUsers YOUR_USER_HERE
In this case, you will make sure your ip