Joe Landman wrote:
Use pam_abl. Really. Even if the password were weak, and they guessed it on the 57th try, pam_abl will stop the login. Read the manual. Adjust the config settings.

Our ssh logs are scary, have been for a while. They aren't the scariest of our logs.

DenyHosts works on a similar principle - http://denyhosts.sourceforge.net/ although pam_abl's pretending to accept logins even when the attacker has been blacklisted sounds downright sneaky!

Could make for an interesting Monday morning pre-coffee login session though - as you wonder why your initially mistyped password still isn't working after 50 login attempts :)

Even paranoids have enemies.

or "I've only been paranoid since they started watching me"?

-stephen

--
Stephen Mulcahy, Applepie Solutions Ltd., Innovation in Business Center,
GMIT, Dublin Rd, Galway, Ireland.  +353.91.751262  http://www.aplpi.com
Registered in Ireland, no. 289353 (5 Woodlands Avenue, Renmore, Galway)
_______________________________________________
Beowulf mailing list, Beowulf@beowulf.org
To change your subscription (digest mode or unsubscribe) visit 
http://www.beowulf.org/mailman/listinfo/beowulf

Reply via email to