The ufw frontend to iptables has an easy 'limit' command that automates
much of the tedium of installing firewall rulesets by hand. This will
address specific IPs doing brute-force login attempts but distributed
brute-force login attempts won't be affected.

There's also a pam_faildelay(8) module that does rate-limiting of users
on authentication failure.

ssh specifically is far safer when password authentication is just not
allowed; ssh keys are not useful to brute-force. Set
"PasswordAuthentication no" in /etc/ssh/sshd_config.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1628926

Title:
  Postpone login attempts if X successive attempts have failed

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1628926/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to