Changes

From SME Server
Jump to navigationJump to search
97 bytes added ,  21:56, 19 August 2017
Line 1: Line 1: −
An alternate method to protect your ssh access from attacks could be either [[Fail2ban]] or [[Denyhosts]].
   
==Public SSH Access==
 
==Public SSH Access==
 
Configuring SSH access as public will result in lots of script based login attempts which consume bandwidth, CPU and generate log noise. A new iptables rule which blocks repeated connection attempts to the configured sshd port. See [[bugzilla: 8257]] and [[bugzilla:8258]]
 
Configuring SSH access as public will result in lots of script based login attempts which consume bandwidth, CPU and generate log noise. A new iptables rule which blocks repeated connection attempts to the configured sshd port. See [[bugzilla: 8257]] and [[bugzilla:8258]]
Line 6: Line 5:     
'''By design only IP outside your local network will be blocked if too many attempts are done.'''
 
'''By design only IP outside your local network will be blocked if too many attempts are done.'''
 +
 +
{{Note box|[[Affa|Affa]] is incompatible with AutoBlock.
 +
Learn is incompatible with AutoBlock.
 +
 +
Use [https://wiki.contribs.org/Fail2ban Fail2ban.]}}
    
===Default values===
 
===Default values===
Line 76: Line 80:     
See the information in the iptables(8) man page for other block list management options.
 
See the information in the iptables(8) man page for other block list management options.
 +
 +
==Similar contribs==
 +
* [[Fail2ban]]
 +
* [[Denyhosts]].
       
[[Category:Howto]]
 
[[Category:Howto]]
 
[[Category:Security]]
 
[[Category:Security]]
3,054

edits

Navigation menu