On Mon, Oct 31, 2005 at 12:26:56PM -0500, Joey Hess wrote: > Stephen R Laniel wrote: > > 1) What do y'all use to block attackers like this? It seems > > to me that anyone who tries to login with a nonexistent > > login name should be blocked immediately, for at least an > > hour. > Because after all, real people never make tpyos.. Sure. Maybe the wrong offhand suggestion to make. But in any case, I'm looking for something that allows me to specify some large combination of policies for SSH blocking. -- Stephen R. Laniel steve@laniels.org +(617) 308-5571 http://laniels.org/ PGP key: http://laniels.org/slaniel.key
Attachment:
signature.asc
Description: Digital signature