[prev in list] [next in list] [prev in thread] [next in thread] 

List:       opensuse-factory
Subject:    Re: [opensuse-factory] sshd attacks blocked by default request
From:       "Rafael E. Herrera" <raffo () cdi ! com>
Date:       2006-07-23 3:55:18
Message-ID: 44C2F326.2020806 () cdi ! com
[Download RAW message or body]

Christian Boltz wrote:
> Hello,
> 
> Am Sonntag, 16. Juli 2006 12:24 schrieb houghi:
>> As most people know, sshd attacks are very common. Also there are
>> various tools out there that can be used to block these attacks.
> [...]
>> It should be something that does not run with cron, as it is to slow
>> to run only each minute.
> 
> The ipt_recent module can do this job without adding a new package:
> https://bugzilla.novell.com/show_bug.cgi?id=104602

Tried adding the suggested rules into
/etc/sysconfig/scripts/SuSEfirewall2-custom.

They don't seem to get loaded, the new rules don't show with 'iptables
--list'

They do load if you issue the commands manually after loading
SuSEfirewall2. The ipt_recent kernel module gets loaded.

Then I logged to a remote machine and attempted more than 4 connections
in rapid sequence and the rule didn't trigger.

Did I do something wrong?

Rafael

---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-factory-unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-factory-help@opensuse.org

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic