Tim Evans wrote: These are script kiddies. Changing ssh to a non standard port instead of the default 22 will also eliminate the attacks. This is useful if your users move around and have different ip's.Scott van Looy wrote:So I ran iptables -A INPUT -s 193.239.125.119 -j DROPThis is likely a losing battle, as you'll never be able to keep adding rules for individual IP's. You can, however, configure iptables to *allow* only a specified list of IP addresses (i.e., the ones you approve of). You should also configure sshd to allow only a specified list of users. man sshd_config for details. If this is not manageable, take a look at denyhosts (http://denyhosts.sourceforge.net/) |
-- fedora-list mailing list fedora-list@xxxxxxxxxx To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list