Eugene Smiley on Fri, 7 Feb 2003 17:50:51 -0500 |
plug-admin@lists.phillylinux.org <> wrote: >> How are you deterining "unauthorized" SSH attempts? Do you mean >> you limit SSH access to certain source IPs? Kinda limits you >> somewhat from checking your home LAN from whereever you happen to >> be, doesn't it? > > What I consider unauthorized attempts are ones that have previously > tried different login names and tried to guess passwords on my > system. If you notice that someone somewhere in the world is > attempting to login to your system searching for passwords and > various login names and their IP address is constant then it would > behove you to block ssh from that IP address. This has happened > more than once on my system. How do you implement this? Do you have a blacklist file or do you create a rule for each attempt through iptables? >>> Also the original question was concerning port forwarding and >>> masquerading. I went a little over board in my response to >>> Scott's question. >> >> It's Linux; that's what we do - stray off-topic and go overboard. >> :-) > > So true I don't know what you two are talking about. Overboard? Off-Topic? Not here.<wink, grin> Eugene _________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.netisland.net/mailman/listinfo/plug-announce General Discussion -- http://lists.netisland.net/mailman/listinfo/plug
|
|