Tim Alberts wrote:
So I setup ssh on a server so I could do some work from home and I think the second I opened it every sorry monkey from around the world has been trying every account name imaginable to get into the system.
What's a good way to deal with this?
CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
~> cat sshd_config ... IgnoreRhosts yes PermitEmptyPasswords no UsePAM yes
Use PAM (Pluggable Authentication Modules). Did anyone mention it here? http://www.kernel.org/pub/linux/libs/pam/whatispam.html "Basically, it is a flexible mechanism for authenticating users."
Regards,
Daniel