Possible hacking on SSH what should I do?

Neil Watson tlug-neil-8agRmHhQ+n2CxnSzwYWP7Q at public.gmane.org
Tue Jul 13 20:20:44 UTC 2010


Be sure your ssh service is hardened.  I recommend allowing only key
authentication and limiting which users are allowed in.

There is little to be gained by trying to catch the cracker.  Chances
are that the IP is that of a zombie under remote control.

-- 
Neil Watson
Linux/UNIX Consultant
http://watson-wilson.ca
--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list