Joe Landman <[EMAIL PROTECTED]> writes:
>   I wrote a tool called "danger" that parses the ssh logs, the
> /etc/hosts.deny logs, and makes ... recommondations about what to
> add. Based upon who has been attacking you.  This pre-dated denyhosts
> by a bit.  I still run it, and it gives me a nightly summary of the
> bad guys.

As my post said earlier, there are probably 30 such tools out there
already. Generally speaking, I don't think they're worth using, except
perhaps as a way to keep your logs a bit emptier.

The easiest way to get safety is just to turn off password based login
via sshd and only allow public key, kerberos, or other methods that do
not involve reusable credentials that go over the wire.

Perry
-- 
Perry E. Metzger                [EMAIL PROTECTED]
_______________________________________________
Beowulf mailing list, Beowulf@beowulf.org
To change your subscription (digest mode or unsubscribe) visit 
http://www.beowulf.org/mailman/listinfo/beowulf

Reply via email to