<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Protecting ssh server connections in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903164#M283365</link>
    <description>I forgot something.&lt;BR /&gt;&lt;BR /&gt;I wrote an hp daemon that uses the syslog to detect invalid login attempts and block those IP's. If you want it, I can crank up a system with it and give it to you.&lt;BR /&gt;&lt;BR /&gt;You may use my itrc profile to reach out to me for it. I think however my first approach is better.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Thu, 23 Nov 2006 05:58:44 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2006-11-23T05:58:44Z</dc:date>
    <item>
      <title>Protecting ssh server connections</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903162#M283363</link>
      <description>Hi everybody,&lt;BR /&gt;My server is an HP-UX B.11.23 (trusted system).&lt;BR /&gt;This system is a pop server with ssh activated in order to  login to the server from the outside (OpenSSH_4.1).&lt;BR /&gt;The problem is that we are victim of ssh attacks (dictionnary attack) and the consequence is that the root account is locked. All days, I have to reactivate my root account. In addition, it causes problem for maintennace operation...&lt;BR /&gt;In the sshd_config file I add the following line :&lt;BR /&gt;PermitRootLogin no&lt;BR /&gt;but it seems to not blocking the attempt...&lt;BR /&gt;So, I would like to block IP address which try to log on my ssh server with too many unsuccesfull attempt...&lt;BR /&gt;Could you please advice me for the best solution ? Maybe I found a way with the use of keep state in ipfilter. Is it a good solution in my case ?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance for your replies.&lt;BR /&gt;Herve</description>
      <pubDate>Thu, 23 Nov 2006 05:17:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903162#M283363</guid>
      <dc:creator>ballans</dc:creator>
      <dc:date>2006-11-23T05:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting ssh server connections</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903163#M283364</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Options:&lt;BR /&gt;1) Install HP ipfilter from &lt;A href="http://software.hp.com" target="_blank"&gt;http://software.hp.com&lt;/A&gt; (its free) and set the system up to limit where ssh connections can come from.&lt;BR /&gt;2) Use a firewall to do the same thing.&lt;BR /&gt;&lt;BR /&gt;We had the same problem with our web servers and stopped it by limiting inbound ssh to our 30 or so offices world-wide.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 23 Nov 2006 05:57:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903163#M283364</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-11-23T05:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting ssh server connections</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903164#M283365</link>
      <description>I forgot something.&lt;BR /&gt;&lt;BR /&gt;I wrote an hp daemon that uses the syslog to detect invalid login attempts and block those IP's. If you want it, I can crank up a system with it and give it to you.&lt;BR /&gt;&lt;BR /&gt;You may use my itrc profile to reach out to me for it. I think however my first approach is better.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 23 Nov 2006 05:58:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903164#M283365</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-11-23T05:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting ssh server connections</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903165#M283366</link>
      <description>You can use also : &lt;BR /&gt;&lt;BR /&gt;AllowUsers   user1,user2,..., userx&lt;BR /&gt;&lt;BR /&gt;in sshd_config&lt;BR /&gt;&lt;BR /&gt;without root user.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;ivan</description>
      <pubDate>Thu, 23 Nov 2006 06:42:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903165#M283366</guid>
      <dc:creator>Ivan Krastev</dc:creator>
      <dc:date>2006-11-23T06:42:16Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting ssh server connections</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903166#M283367</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Modify file /etc/opt/ssh/sshd_config&lt;BR /&gt;&lt;BR /&gt;permitRootLogin no&lt;BR /&gt;&lt;BR /&gt;Restart sshd daemon.&lt;BR /&gt;&lt;BR /&gt;rgs.&lt;BR /&gt;</description>
      <pubDate>Thu, 23 Nov 2006 07:04:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/protecting-ssh-server-connections/m-p/3903166#M283367</guid>
      <dc:creator>rariasn</dc:creator>
      <dc:date>2006-11-23T07:04:06Z</dc:date>
    </item>
  </channel>
</rss>

