[CentOS] Dealing with brute force attacks
James Matthews
nytrokiss at gmail.comSun May 17 11:00:09 UTC 2009
- Previous message: [CentOS] Dealing with brute force attacks
- Next message: [CentOS] Problem booting 2.6.30-rc5 kernel
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
What you can try doing is putting some services on a non standered port (like SSH on port 4583) This will stop most (not all) attacks coming in at port 22. James On Fri, May 15, 2009 at 8:21 PM, James B. Byrne <byrnejb at harte-lyne.ca>wrote: > On: Thu, 14 May 2009 13:00:09 -0700, Scott Silva > <ssilva at sgvwater.com> wrote: > > > > http://packages.sw.be/fail2ban/ > > > > Thank you, got it. > > In the meantime I revised my existing iptables rules to throttle > connections to ssh, pop3, imap and ftp (which service is not running > in any case). > > Thanks for all the help from everybody. > > -- > *** E-Mail is NOT a SECURE channel *** > James B. Byrne mailto:ByrneJB at Harte-Lyne.ca > Harte & Lyne Limited http://www.harte-lyne.ca > 9 Brockley Drive vox: +1 905 561 1241 > Hamilton, Ontario fax: +1 905 561 0757 > Canada L8E 3C3 > > _______________________________________________ > CentOS mailing list > CentOS at centos.org > http://lists.centos.org/mailman/listinfo/centos > -- http://www.goldwatches.com -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.centos.org/pipermail/centos/attachments/20090517/7192f80f/attachment-0001.html>
- Previous message: [CentOS] Dealing with brute force attacks
- Next message: [CentOS] Problem booting 2.6.30-rc5 kernel
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the CentOS mailing list