Douglas Tutty <[EMAIL PROTECTED]> writes:
> Is there a way to configure the firewall to only allow or deny connection
> attempts from certain ip addresses?
I set my firewall to only allow one connection pr minute pr ip address.
So, if you fail the connection, the firewall will drop all connection
On Wed, Nov 15, 2006 at 06:51:02PM +, Shri Shrikumar wrote:
> Hi All,
>
> I have a few servers on which there is a regular penetration attempts
> using brute force password guessing bots.
>
> There is little risk to the server but am getting more and more annoyed
> by this and as far as I c
8 PM
> To: debian-user@lists.debian.org
> Subject: Re: Reporting brute force ssh login attempts
>
> On Wednesday 15 November 2006 18:51, Shri Shrikumar wrote:
> > Hi All,
> >
> > I have a few servers on which there is a regular penetration attempts
> > using brut
8 PM
> To: debian-user@lists.debian.org
> Subject: Re: Reporting brute force ssh login attempts
>
> On Wednesday 15 November 2006 18:51, Shri Shrikumar wrote:
> > Hi All,
> >
> > I have a few servers on which there is a regular penetration attempts
> > using brut
On Wed, Nov 15, 2006 at 09:04:08PM -0600, Nate Bargmann wrote:
>
> Is using only version 2 public key authentication not possible? I'm
> just learning ssh, so maybe I'm misled thinking that is less vulnerable
> to a brute force attack.
>
Whether or not just using ssh2 with public keys is possib
* Shri Shrikumar <[EMAIL PROTECTED]> [2006 Nov 15 12:57 -0600]:
> Is there a another option? Alternatively, is there a way of
> automatically reporting offending ip's?
Is using only version 2 public key authentication not possible? I'm
just learning ssh, so maybe I'm misled thinking that is les
On Wednesday 15 November 2006 21:00, Shri Shrikumar wrote:
> Hi Peter,
>
> Peter Colton wrote:
> > A handy tool I use to cut down on ssh brute force attacks is fail2ban :
> > You can install it from backports.org.
> > Add the backport url to your sources.list
> > http://www.backports.org/dokuwiki
On Wed, 15 Nov 2006 21:00:10 +
Shri Shrikumar <[EMAIL PROTECTED]> wrote:
> Hi Peter,
>
> Peter Colton wrote:
> > A handy tool I use to cut down on ssh brute force attacks is
> > fail2ban : You can install it from backports.org.
> > Add the backport url to your sources.list
> > http://www.
Shri Shrikumar:
>
> 1. Report each ip address that does this. However, a lot of them seems
> to be from asia with no proper abuse@ address to contact. Additionally,
> this can be very time consuming.
I do not think you achieve much by doing this. Doing this automatically,
as you suggested below
Hi Peter,
Peter Colton wrote:
A handy tool I use to cut down on ssh brute force attacks is fail2ban : You
can install it from backports.org.
Add the backport url to your sources.list
http://www.backports.org/dokuwiki/doku.php?id=instructions
Then after you have installed fail2ban comment out
On Wednesday 15 November 2006 18:51, Shri Shrikumar wrote:
> Hi All,
>
> I have a few servers on which there is a regular penetration attempts
> using brute force password guessing bots.
>
> There is little risk to the server but am getting more and more annoyed
> by this and as far as I can see am
On Wed, 15 Nov 2006 18:51:02 +
Shri Shrikumar <[EMAIL PROTECTED]> wrote:
> Hi All,
>
> I have a few servers on which there is a regular penetration
> attempts using brute force password guessing bots.
>
> There is little risk to the server but am getting more and more
> annoyed by this and
On 11/15/06, Shri Shrikumar <[EMAIL PROTECTED]> wrote:
Hi All,
I have a few servers on which there is a regular penetration attempts
using brute force password guessing bots.
There is little risk to the server but am getting more and more annoyed
by this and as far as I can see am left with two
Hi All,
I have a few servers on which there is a regular penetration attempts
using brute force password guessing bots.
There is little risk to the server but am getting more and more annoyed
by this and as far as I can see am left with two options.
1. Report each ip address that does this.
14 matches
Mail list logo