On Wed, Sep 29, 2004 at 04:10:58PM -0400, Nicolas wrote:
> 
> > So, my question is this. Is there a way to tell ssh to refuse
> > connections from an ip address after a certain number of failed
> > login attempts, or is snort the only way to do something like this?
> > So far I've been taking the manual approach, blocking the ip address
> > with my firewall after I see it hitting the logs, but that can give
> > them about an hour to play before I notice it (e-mailed to me by
> > logcheck).
> >
> > Any suggestions?
> 
> If you dont have to much user who log in your server, you can allow
> only them from specific IP to log in.  Or you can disable the password
> facility and only use keys (we do it this way at the job, It's also
> what I do at home).

You'll want to be careful about how you disable password authentication
and which versin of SSH you're using.  Recent Debian ssh packages
automatically enable the UsePAM directive when upgrading from older
package versions (include the version found in woody currently).  This
can lead to password authentication being turned back on, even though
the admin turned it off.

   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=250369
   
-- 
Jamin W. Collins

Remember, root always has a loaded gun.  Don't run around with it unless
you absolutely need it. -- Vineet Kumar


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to