1 |
On Wednesday 25 October 2006 05:37, Mark wrote: |
2 |
> On 24/10/06, Andrew Ross <aross@g.o> wrote: |
3 |
> > There is an excellent article at |
4 |
> > http://www.debian-administration.org/articles/187 describing the use of |
5 |
> > the "recent" netfilter module in stopping brute-force ssh attacks at the |
6 |
> > firewall level. |
7 |
> |
8 |
> The negative with this approach is that it affects ALL ssh |
9 |
> connections, including valid ones. If a known user logs in correctly 4 |
10 |
> times in too short a time, they too are banned. |
11 |
> |
12 |
> Mark |
13 |
To mitigate this in ~/.ssh/config |
14 |
|
15 |
Host * |
16 |
ControlMaster auto |
17 |
ControlPath ~/.ssh/master-%r@%h:%p |
18 |
|
19 |
reuses the ssh connection for multiple ssh terminals. |
20 |
|
21 |
As Dale said before only a few static ips are used from the source so the |
22 |
rules should be easy. |
23 |
|
24 |
Andrew, good writeup. |
25 |
|
26 |
-- |
27 |
Daniel Black <dragonheart@g.o> |
28 |
Gentoo Foundation |