Mike Kercher wrote: > iptables, disallow root login via ssh, no valid shell for users that > don't need one, strong passwords, keys would be a good start. > > Mike > > iptables..add the ip of the attack source to reject? They keep moving IP, this is very time consuming (but I am doing it). I don't allow root login. I think I got a good password, and I got keys setup so I know I'm talking to my server.