tid=35277&以下參考:
/ ]: r5 b/ V% u N3 J; W& Jhttp://serverfault.com/questions/275669/ssh-sshd-how-do-i-set-max-login-attempts
, v3 {" t/ E. Uhttp://www.cnblogs.com/taosim/articles/3134394.html) O1 k9 L5 \2 g
, O) q, Q2 Y1 U" W' R
1) 在/etc/ssh/sshd_config加入下列一行 P! P, |% F# H9 |1 s. a# Q
. v3 Z3 W* q7 I3 B. m% c
2 h0 H7 _: ^. A$ h8 `+ v J2) 在防火牆加入下列規則
8 N8 a! P& f7 M% Q; ^( h- iptables -N SSHATTACK
, p. l: x, Y1 t - iptables -A SSHATTACK -j LOG --log-prefix "Possible SSH attack! " --log-level 7
1 N$ H+ `( s {; ] - iptables -A SSHATTACK -j DROP
複製代碼
* j" q8 }% F/ i+ D4 r* j
3 J4 q& a1 A1 b: s3) 在/var/log/syslog 觀察可能的ssh攻擊
! a) v' o& ]( m- Dec 27 18:01:58 ubuntu kernel: [ 510.007570] Possible SSH attack! IN=eth0 OUT= MAC=01:2c:18:47:43:2d:10:c0:31:4d:11:ac:f8:01 SRC=192.168.203.129 DST=192.168.203.128 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=30948 DF PROTO=TCP SPT=53272 DPT=1785 WINDOW=14600 RES=0x00 SYN URGP=0
複製代碼 1 R, _9 U- z. G* A6 x) M. r. w; Y! V
* w( R$ e7 @% v/ D+ u5 @
3 H+ y0 i! F7 v2 [1 @
& W2 Y0 M. g* B
|