Debian-news is about one simple thing - news about Debian GNU/Linux and the top free distributions based on Debian GNU/Linux.


 

How to Prevent SSH Brute Force Attacks with Fail2Ban on Debian 7

Fail2ban is an open-source intrusion prevention system that can be used to prevent brute force attacks and other suspicious malicious attacks. It scans log files (e.g. /var/log/apache/error_log) and bans IP’s that show the malicious signs such as too many password failures, seeking for exploits etc.

Read more here

3 Responses to “How to Prevent SSH Brute Force Attacks with Fail2Ban on Debian 7” »

  1. Pingback by How to Prevent SSH Brute Force Attacks with Fail2Ban on Debian 7 - Debian Info — July 31, 2013 @ 8:55 pm

    [...] ← How to Prevent SSH Brute Force Attacks with Fail2Ban on Debian 7 [...]

  2. Comment by marco — August 1, 2013 @ 8:12 am

    Please take a look also at denyhosts, which do the same works, but don’t need iptables and manage a shared repository of banned hosts. Of course, it’s also in debian

  3. Comment by Werner Block — August 29, 2013 @ 8:37 am

    Hey

    Example:
    hosts.deny
    Code:
    SSHD: ALL

    hosts.allow
    Code:
    SSHD: 98.61.0.0/255.255.0.0 98.62.0.0/255.255.0.0 192.168.12.3 127.0.0.1

RSS feed for comments on this post. TrackBack URI

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *


*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Debian-News is not related to the Debian Project.
All logos and trademarks on this site are property of their respective owners.