There is for ssh.
Denyhosts has a syncronization mode where you can share info back to the community.
http://denyhosts.sourceforge.net/
See the faq for sync mode.
On Thu, Feb 15, 2007 at 11:27:05AM -0500, Drew Weaver said:
I find it kind of odd that noone has come up with a 'RBL' for bots...
ISPs could easily receive routes via BGP from "some trusted source" that has NULL routes for all of the 'infected' hosts which are attacking people..
A few dozen honeypots and you would quickly have a large list of infected hosts in which to ignore entirely.
-Drew
-----Original Message----- From: centos-bounces@centos.org [mailto:centos-bounces@centos.org] On Behalf Of chrism@imntv.com Sent: Thursday, February 15, 2007 11:10 AM To: CentOS mailing list Subject: Re: [CentOS] Defending againts simultanious attacks
John R Pierce wrote:
chrism@imntv.com wrote:
That doesn't really have much affect anymore. The bad people are now
scanning high ports looking for any sshd (or other service) that's listening.
they aren't "people", they are virus/worms... blindly poking at ports and trying the same lame list of passwords.
you can't make them stop, unless you control the entire world... just ignore the noise.
I think everyone on the list is aware of the automated nature of the attacks. And I *do* ignore the noise.
Cheers, _______________________________________________ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos _______________________________________________ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos