Changes

From SME Server
Jump to navigationJump to search
52 bytes removed ,  06:34, 5 November 2014
m
Formatting
Line 1: Line 1: −
An alternate method to protect your ssh access from attacks could be either [[Fail2ban]] or [[Denyhosts]].
   
==Public SSH Access==
 
==Public SSH Access==
 
Configuring SSH access as public will result in lots of script based login attempts which consume bandwidth, CPU and generate log noise. A new iptables rule which blocks repeated connection attempts to the configured sshd port. See [[bugzilla: 8257]] and [[bugzilla:8258]]
 
Configuring SSH access as public will result in lots of script based login attempts which consume bandwidth, CPU and generate log noise. A new iptables rule which blocks repeated connection attempts to the configured sshd port. See [[bugzilla: 8257]] and [[bugzilla:8258]]
Line 76: Line 75:     
See the information in the iptables(8) man page for other block list management options.
 
See the information in the iptables(8) man page for other block list management options.
 +
 +
 +
==Similar contribs==
 +
* [[Fail2ban]]
 +
* [[Denyhosts]].
       
[[Category:Howto]]
 
[[Category:Howto]]
 
[[Category:Security]]
 
[[Category:Security]]

Navigation menu