On Wed, 29 Sep 2004 16:13:10 -0500, Jacob S <[EMAIL PROTECTED]> wrote:
> On Wed, 29 Sep 2004 16:10:58 -0400
> Nicolas <[EMAIL PROTECTED]> wrote:
> 
> >
> > > So, my question is this. Is there a way to tell ssh to refuse
> > > connections from an ip address after a certain number of failed
> > > login attempts, or is snort the only way to do something like this?
> > > So far I've been taking the manual approach, blocking the ip address
> > > with my firewall after I see it hitting the logs, but that can give
> > > them about an hour to play before I notice it (e-mailed to me by
> > > logcheck).
> > >
> > > Any suggestions?
> >
> > If you dont have to much user who log in your server, you can allow
> > only them from specific IP to log in.  Or you can disable the password
> > facility and only use keys (we do it this way at the job, It's also
> > what I do at home).
> 
> That would work for the server that's currently having problems, but not
> all of my servers, unfortunately.
> 
> >  Nic Cola
> >
> > P.S.
> >  Just for the fun of it, you can also tarpit the IP of the script
> >  kiddy ;o)
> 
> I'd love to, but I need a way to automate it to make it practical. I'm
> noticing that very few of these attempts are coming from cable or dsl
> users. Most of them seem to be coming from some remote machine inside a
> large webhosting company. I haven't been able to determine if the box
> was taken over by crackers or the users are abusing it; though my guess
> is crackers. Either way they're a pest.
> 

I've read this reported some times ago on the full-disclosure mailing
list, someone was worried about a new SSH exploit, i don't recall the
details but seems there's a script that tries some weak
username/password combinations...


Andrea


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to