John Marten wrote:
> You know what i mean? Every day I get some script kiddie, or adult
> trying to guess usernames or passwords.
> I've installed the newest version of SSH, so i'm covered there. But I
> still get a dozen or 2 of the
> "sshd Invalid user somename from ###.##.##.###"
> "input_userauth_request: ivalid user somename"
> "Failed password for invalid user somename"
> "Recieved disconnect from ###.##.##.###"
> Someone told me to add a 'block in quick on $net inet proto {tcp,udp}
> from ###.##.##.### to any flags S/SA'
> entry in my pf.conf file. But if I had do that for every hacker my
> pf.conf would be huge!
> There's got to be a better way, and I'm open to suggestions.
> 
> 
> John F. Marten III
> 
> Information Technology Specialist
> 


http://lfriends.franoculator.com/phpBB2/viewtopic.php?t=103

That's the hosts.deny method, for those of you scoring at home.

It's a good solution, but you're better off enabling DSA/RSA keys and
doing away with password auth altogether.  Running sshd on a different
port never hurt anyone either.

HTH.


-- 
Matt

Reply via email to