Russ Price wrote:
> Bob Proulx wrote:
> >Personally I would just ignore it in the logs.
>
> The log floods get annoying after a while, so I'm using the ipt_recent
> module (CONFIG_IP_NF_MATCH_RECENT) to rate-limit incoming attempts to
> port 22 - more than three times in 60 seconds results in a
Bob Proulx wrote:
Matt Peter wrote:
I'd like to be able to IP ban these connections after a
set number of failed login attempts.
Of course you suggestion to put this on a non-standard port leads me
to believe this is just for you and no one else though so that might
be fine in that case.
Per
Matt Peter wrote:
> I'm receiving a few hundred failed ssh login attempts per day. I'm not
> worried about it, since they appear automated and ssh is locked down
> appropriately. I'd like to be able to IP ban these connections after a
> set number of failed login attempts.
Having personally e
On Sunday, 10.07.2005 at 17:06 -0400, Craig Russell wrote:
> >I'm receiving a few hundred failed ssh login attempts per day. I'm
> >not worried about it, since they appear automated and ssh is locked
> >down appropriately. I'd like to be able to IP ban these connections
> >after a set number of
Matt Peter wrote:
I'm receiving a few hundred failed ssh login attempts per day. I'm
not worried about it, since they appear automated and ssh is locked
down appropriately. I'd like to be able to IP ban these connections
after a set number of failed login attempts. I'd rather not put ssh
Search in the archives of the list.
http://lists.debian.org/search.html
--
"Meine Hoffnung soll mich leiten
Durch die Tage ohne Dich
Und die Liebe soll mich tragen
Wenn der Schmerz die Hoffnung bricht"
On Sunday 10 July 2005 10:24, Matt Peter wrote:
> I'm receiving a few hundred failed ssh login attempts per day. I'm
> not worried about it, since they appear automated and ssh is locked
> down appropriately. I'd like to be able to IP ban these connections
> after a set number of failed login att
7 matches
Mail list logo