[CentOS] One approach to dealing with SSH brute force attacks.
David Mackintosh
David.Mackintosh at xdroop.comThu Jan 31 04:17:40 UTC 2008
- Previous message: [CentOS] One approach to dealing with SSH brute force attacks.
- Next message: [CentOS] One approach to dealing with SSH brute force attacks.
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
On Wed, Jan 30, 2008 at 12:17:22PM -0500, Ed Donahue wrote: > I use this one, works great and easy to setup > http://rfxnetworks.com/bfd.php This is how I deal with them: deny by default unless you know the "secret handshake". http://wiki.xdroop.com/space/Linux/Limited+SSH+Access -- /\oo/\ / /()\ \ David Mackintosh | dave at xdroop.com | http://www.xdroop.com -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <http://lists.centos.org/pipermail/centos/attachments/20080130/d0a83f9a/attachment-0001.sig>
- Previous message: [CentOS] One approach to dealing with SSH brute force attacks.
- Next message: [CentOS] One approach to dealing with SSH brute force attacks.
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the CentOS mailing list