点击这里获取免费大流量卡

At a Glance
How to run DenyHosts on a SmartMachine.

You can install DenyHosts to help prevent SSH server attacks (also known as dictionary-based or brute-force attacks). DenyHosts runs as a service that watches for multiple failed login attempts from an IP address and then locks out that IP once it reaches the login threshold.
You can sync from public servers that block attacks from known malicious IP addresses.
To configure DenyHosts for your SmartMachine: 
You can run DenyHosts manually, as a daemon or as a cron job.
    1. SSH into your SmartMachine and run this command:
pkgin in py27-denyhosts
    1. Open the configuration file for edit:
/opt/local/etc/denyhosts.conf
    1. Locate the following section:
# Mandrake, FreeBSD or OpenBSD:
\#SECURE_LOG = /var/log/auth.log
\#
# NetBSD:
SECURE_LOG = /var/log/authlog
    1. Remove the comment from the first SECURE_LOG line and add a comment to the second SECURE_LOG line:
# Mandrake, FreeBSD or OpenBSD:
SECURE_LOG = /var/log/auth.log
\#
# NetBSD:
\#SECURE_LOG = /var/log/authlog
This will ensure DenyHosts is looking at the right logfile.
    1. Enable DenyHosts:
svcadm enable denyhosts
    1. Verify DenyHosts is running:
svcs -a | grep denyhosts
If successful, you should see something similar to this:
online 22:57:04 svc:/network/denyhosts:default
This will block any host with failed logins that exceed the thresholds set in the configuration file.
You can modify the configuration file to adjust the default thresholds for various failed logins (invalid user, valid user, root).
来源: <http://wiki.joyent.com/wiki/display/jpc2/Using+DenyHosts>

点击这里获取免费大流量卡

如果您喜欢本站,点击这儿可以捐赠本站
这些信息可能会帮助到你: 联系作者 | 报毒说明
修改版本软件,加群提示等均为修改者自留,非本站信息,注意鉴别