If you want to be extra paranoid, hide your open ports with port knocking and 
have your clients run from a script that knocks the proper sequence before 
making the connection :-)

Jay

On Feb 5, 2013, at 19:10, Jérémie Marguerie <jere...@marguerie.org> wrote:

> Le 5 févr. 2013 23:03, "Bartek Krajnik" <bar...@bmk-it.com> a écrit :
> >
> > Hi,
> > For ssh login attempts you can use program authfail (after 4 wrong login 
> > attempts it adds proper IP to netfilter with DROP rule sending notification 
> > to IP class owner from whois database).
> 
> It sounds a bit overkill. 
> Am I the only one sometimes typing my password incorrectly because I forgot 
> it?
> 
> Fail2ban does pretty much the same job but only ban for a few minutes. It's 
> just a way to slow down bruteforce. Having 20 guesses per 10 minutes makes a 
> bruteforce useless if the passwords are decent.
> 
> And it will not annoy too much your users but will annoy stupid bots.
> 
> -- 
> Jérémie Marguerie

Reply via email to