tid=35277&以下參考:) _& L+ z) y6 F+ Z; @
http://serverfault.com/questions/275669/ssh-sshd-how-do-i-set-max-login-attempts1 \, ]2 m+ P* m" H: ?2 I! s
http://www.cnblogs.com/taosim/articles/3134394.html
5 T& R! P; a9 }/ d% B, L. ^3 ]# E$ ~0 Q% }- X$ i- y
1) 在/etc/ssh/sshd_config加入下列一行
4 S1 O7 c' j" W0 I/ L8 y# H; f& Y' ?9 I
) R; c5 u) J. O* J" c! x& D- T
2) 在防火牆加入下列規則
4 Z' C& T: d& k9 {- I* O- iptables -N SSHATTACK: G, S' |+ M- E+ {
- iptables -A SSHATTACK -j LOG --log-prefix "Possible SSH attack! " --log-level 7
3 X# [7 a* V1 V" W$ w0 u - iptables -A SSHATTACK -j DROP
複製代碼
' S, Q- n* m$ l8 i" \8 Z6 [% T: v& b3 }- l
3) 在/var/log/syslog 觀察可能的ssh攻擊5 B" l- K) y* Q: b7 z; n4 G+ L
- Dec 27 18:01:58 ubuntu kernel: [ 510.007570] Possible SSH attack! IN=eth0 OUT= MAC=01:2c:18:47:43:2d:10:c0:31:4d:11:ac:f8:01 SRC=192.168.203.129 DST=192.168.203.128 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=30948 DF PROTO=TCP SPT=53272 DPT=1785 WINDOW=14600 RES=0x00 SYN URGP=0
複製代碼 . G3 w6 P, ^+ j2 M( o
, q5 d( @: B6 ]# g' }2 c7 [- W; V
8 f0 m0 h; ]7 l1 E9 B
4 P0 Y/ O9 J; N4 J2 K6 O( | |