Ian (
lovingboth) wrote2007-03-13 09:36 pm
![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Hello script kiddies
Not you :) but various attackers are having a go at the box that hosts my domains. They're attempting to log in via ssh as various users, most of whom don't exist.
Rather than just hope that they don't find a) a valid user and b) a valid password, I've got around to installing DenyHosts which notices such things and sticks their IP addresses into a 'don't even bother' file for the box to ignore future requests from.
One feature is that you can share this info with other users, and get a list of their attackers too... which I haven't enabled yet.
Anyone else running this? Do you enable synchronization mode?
Rather than just hope that they don't find a) a valid user and b) a valid password, I've got around to installing DenyHosts which notices such things and sticks their IP addresses into a 'don't even bother' file for the box to ignore future requests from.
One feature is that you can share this info with other users, and get a list of their attackers too... which I haven't enabled yet.
Anyone else running this? Do you enable synchronization mode?
no subject