tid=35277&以下參考:
$ G" U, e7 ?$ S% f1 b) uhttp://serverfault.com/questions/275669/ssh-sshd-how-do-i-set-max-login-attempts9 |( _8 M- V" a9 y, C
http://www.cnblogs.com/taosim/articles/3134394.html* K. N+ p# ^: |$ g; F
6 M( T+ l2 i( x1) 在/etc/ssh/sshd_config加入下列一行1 T& _: o2 b3 ?% n! N
! @( o4 l/ T/ `6 P! R9 j" t; [0 V! x' N3 Z. h* J6 z- ?
2) 在防火牆加入下列規則/ O+ D3 X+ H: u; G7 \" C
- iptables -N SSHATTACK
, D3 z- \% i, L& Y - iptables -A SSHATTACK -j LOG --log-prefix "Possible SSH attack! " --log-level 7
/ m1 j/ ]+ { u9 x Z( u - iptables -A SSHATTACK -j DROP
複製代碼 ! Y K3 ^, P/ F% y
% F: t# E" q# c# G
3) 在/var/log/syslog 觀察可能的ssh攻擊
$ O& k8 g$ n% U' q, [" N- Dec 27 18:01:58 ubuntu kernel: [ 510.007570] Possible SSH attack! IN=eth0 OUT= MAC=01:2c:18:47:43:2d:10:c0:31:4d:11:ac:f8:01 SRC=192.168.203.129 DST=192.168.203.128 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=30948 DF PROTO=TCP SPT=53272 DPT=1785 WINDOW=14600 RES=0x00 SYN URGP=0
複製代碼 , O' u8 ]8 p {+ Q% u8 [
1 q+ `! s( ^8 D) y: Z, I2 c- s" u1 T0 a
( ~& q. E0 H2 o: v0 p
|