On Sunday, 10.07.2005 at 17:06 -0400, Craig Russell wrote:

> >I'm receiving a few hundred failed ssh login attempts per day.  I'm
> >not worried about it, since they appear automated and ssh is locked
> >down appropriately.  I'd like to be able to IP ban these connections
> >after a set number of failed login attempts.  I'd rather not put ssh
> >on a nonstandard port since I'd need to specify it on the cli every
> >time I ssh (right?).  Does anything have any insight into how I might
> >go about achieving this?
>
> You could also investigate 'port knocking.'  Basically whaat this
> means is that you stop the sshd entirely and you have another process
> running that waits for a specific group of connections and then it
> spawns the sshd daemon and allows connection from the ip address that
> 'knocked.'  The knock doesn't give any kind of response other than
> enabling ssh for the ip address so anyone scanning the machine will
> simply get dropped connections for those ports.  I am having a similar
> issue to yours and I believe port knocking to be a viable solution,
> just haven't had the time to implement it.

This is correct, except that typically the sshd is always running, just
firewalled-off from the world.  The correct 'knock' opens up the ssh
port to the knocking IP ...

Dave.
-- 
Please don't CC me on list messages!
...
Dave Ewart - [EMAIL PROTECTED] - jabber: [EMAIL PROTECTED]
All email from me is now digitally signed, key from http://www.sungate.co.uk/
Fingerprint: AEC5 9360 0A35 7F66 66E9 82E4 9E10 6769 CD28 DA92

Attachment: signature.asc
Description: Digital signature

Reply via email to