On Thu, 2005-04-28 at 07:11 -0700, Alan Dayley wrote:
> I have found that my dsl connection drops and changes my IP so much that
> doing RSA keys, while more secure, was too painful (How to is explained
> in the link above).
What has worked for my home network is a combination of things.
The first two could be considered lame, but my goal is to first turn the
flood down to a trickle.
1. iptables reject as much as you can. If you're on a dialup that sits
on a class B, allow the whole class B. You can even allow a class A.
That's a lot of IP's that can still attempt, but a lot more will be
blocked. Some of the population will see you, most won't.
2. /etc/hosts.allow with identd. Yes, identd is not a secure protocol,
but it reduces the flow a little more. The following would only allow
fred from qwest.net in if he is running identd.
sshd: fred@.qwest.net
On your client side, you could limit auth requests to known IP's if
you're worried about running an identd daemon.
3. Use a non-standard port.
4. Use RSA keys.
Daniel
--
| ---------------------------------------------------------------
| Daniel P. Stasinski | http://www.saidsimple.com
| daniel@avenues.org | http://www.disabilities-r-us.com
| --------------------------- | http://www.scriptkitties.com
| Jabber: mooooooo@jabber.org | http://oneweek.org
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change you mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss