Lol, you made my day, thanksShutdown your server or disconnect the network cable or only use private internet addresses. Everything else with a publicly routable internet address will get BF attacks. Deal with it by using very strong passwords and indeed a tool like csf.
Suppose your ip change over night due to network changes, how will you be able to get into your server then?Disallow SSH/DirectAdmin/FTP access from all IP's except your own. I do this.
Suppose your ip change over night due to network changes, how will you be able to get into your server then?
And you can't block FTP that way unless you don't give your customers FTP acces.
SSH Portknocking or ssh keys only.Suppose your ip change over night due to network changes, how will you be able to get into your server then?
And you can't block FTP that way unless you don't give your customers FTP acces.
hello port 22 is unavailable currently. please leave a message.Portknocking
Why not? Suppose I close port 22 as suggested, SSH keys don't bypass the firewall, do they?but with ssh keys or port knocking, you don't have to whitelist your ip-address.
I said 'you don't have to' because you don't have to close the ssh port in the first place.Why not? Suppose I close port 22 as suggested, SSH keys don't bypass the firewall, do they?
But indeed, it's no solution to avoid bruteforces, they will always be there.
Yep, but I was talking about what jayw1 was saying. Limit to your ip, but then what if the ip change. SSH keys won't help you then either, how do you get in without any DA, SSH or FTP access. That's a real risk.I said 'you don't have to' because you don't have to close the ssh port in the first place.
I think solutions differ if you have one server or a lot of servers. We have more than one person's ip whitelisted so if one ip changes, the other can update the edge firewallsYep, but I was talking about what jayw1 was saying. Limit to your ip, but then what if the ip change. SSH keys won't help you then either, how do you get in without any DA, SSH or FTP access. That's a real risk.
By the way... I leave port 22 open just for fun and attack blocking, but my SSH does run on a completely other port with SSH keys enabled. Makes life a lot easier.![]()