What you can try doing is putting some services on a non standered port
(like SSH on port 4583) This will stop most (not all) attacks coming in at
port 22.

James

On Fri, May 15, 2009 at 8:21 PM, James B. Byrne <byrn...@harte-lyne.ca>wrote:

> On: Thu, 14 May 2009 13:00:09 -0700, Scott Silva
> <ssi...@sgvwater.com> wrote:
> >
> > http://packages.sw.be/fail2ban/
> >
>
> Thank you, got it.
>
> In the meantime I revised my existing iptables rules to throttle
> connections to ssh, pop3, imap and ftp (which service is not running
> in any case).
>
> Thanks for all the help from everybody.
>
> --
> ***          E-Mail is NOT a SECURE channel          ***
> James B. Byrne                mailto:byrn...@harte-lyne.ca
> Harte & Lyne Limited          http://www.harte-lyne.ca
> 9 Brockley Drive              vox: +1 905 561 1241
> Hamilton, Ontario             fax: +1 905 561 0757
> Canada  L8E 3C3
>
> _______________________________________________
> CentOS mailing list
> CentOS@centos.org
> http://lists.centos.org/mailman/listinfo/centos
>



-- 
http://www.goldwatches.com
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to