- Modify sshd_config
 Just add in /etc/ssh/sshd_config
 AllowUsers *@192.169.1.1
 People non connecting from 192.168.1.1 will be prompted for username and password, but they could try forever as none will work.
- Use inetd
 Add in /etc/hosts.deny:
 sshd: ALL
 and in /etc/hosts.allow:
 sshd: 192.169.1.1
 People outside 192.168.1.1 receive a: ssh_exchange_identification: Connection closed by remote host, while nmap states port 22 as "open".
- Use iptables
 Add to INPUT chain, with a default deny, something like:
 iptables -A INPUT -p tcp -m tcp -s 192.169.1.1/32 --dport 22 --syn -j ACCEPT
 People outside 192.168.1.1 will have connection hanged, and nmap says port 22 is "filtered".
Friday, 9 January 2009
Block ssh connection by IP
The subject is rather lame, as blocking ssh by IP source is really last resource. But sometimes can be handy.
Subscribe to:
Post Comments (Atom)
 
No comments:
Post a Comment