![]() |
Preventing SSH Dictionary Attacks With DenyHosts
Preventing SSH Dictionary Attacks With DenyHosts
"DenyHosts is a script intended to be run by Linux system administrators to help thwart ssh server attacks. If you've ever looked at your ssh log (/var/log/secure on Redhat, /var/log/auth.log on Mandrake, etc...) you may be alarmed to see how many hackers attempted to gain access to your server. Hopefully, none of them were successful (but then again, how would you know?). Wouldn't it be better to automatically prevent that attacker from continuing to gain entry into your system? DenyHosts attempts to address the above... " I found this tutorial very helpful and I thought I would share it with you guys, so you can learn how to protect your servers better. Of course, most of you are probably old hands at this, but still it is good to start with the basics. |
Thank you for sharing with the community!
|
How well does this prevent attacks?
I will assume it is not bullet proof. Is there anything else we can do to take steps to try and stop dictionary attacks? ________ e cigarette |
Quote:
|
Thank you VERY much for sharing this with me! I'm a beginner in the whole Linux server industry, and this is some great information.
Also - SoulWatcher - thanks very much for the link you have also provided. |
I'll have to forward this to my friend, for his web hosting company. I am pretty sure he has this already though.
|
i just closed port 22 on my router so only internal machines can SSH eachother
|
One thing we do to add some more security for SSH is we don't use the shared IP as the listen IP for SSH and we don't use the standard port 22. SSH is disabled by default and can be turned on for 24 hours max at a time.
Then we also have it set where a email is sent with IP and ISP information of the person that just logged in. |
Quote:
|
All times are GMT -5. The time now is 11:04 AM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
HTML Help provided by HTML Help Central.