gpg: Signature made Sat Dec 15 08:19:45 2012 UTC
gpg: using DSA key 2099B64CBF15490B
gpg: Good signature from "Andy Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andrew James Smith <andy@strugglers.net>" [unknown]
gpg: aka "Andy Smith (UKUUG) <andy.smith@ukuug.org>" [unknown]
gpg: aka "Andy Smith (BitFolk Ltd.) <andy@bitfolk.com>" [unknown]
gpg: aka "Andy Smith (Linux User Groups UK) <andy@lug.org.uk>" [unknown]
gpg: aka "Andy Smith (Cernio Technology Cooperative) <andy.smith@cernio.com>" [unknown]
Hi Gerald,
On Fri, Dec 14, 2012 at 09:24:36PM +0000, Gerald Davies wrote:
> I noticed this problem with fail2ban when I first looked at IPv6 and
> ended up writing a firewall script for ip6tables to handle SSH
> attacks. It uses the '-m recent' (etc) parameters and appears to
> work.
If you could add any notes on that to:
https://tools.bitfolk.com/wiki/Protecting_against_SSH_dictionary_attacks
it would be much appreciated.
Cheers,
Andy
--
http://bitfolk.com/ -- No-nonsense VPS hosting