Dave Plater wrote:
Try fail2ban Fail2Ban scans log files like /var/log/pwdfail or /var/log/apache/error_log and bans IP that makes too many password failures. It updates firewall rules to reject the IP address or executes user defined commands. Regards Dave P
Thanks Dave, I'll have a look, but I kinda liked my temporary solution for the immediate problem. But, I have to admit, hitting :w was kind of scary from the other end of the connection. I didn't know if I was going to nuke myself or not. Thankfully, linux is smarter than that and won't disconnect established connections on changes to hosts.allow (I know, I screwed up the logic the first two times ;-) -- David C. Rankin, J.D.,P.E. | Rankin Law Firm, PLLC | Countdown for openSuSE 11.1 510 Ochiltree Street | http://counter.opensuse.org/11.1/small Nacogdoches, Texas 75961 | Telephone: (936) 715-9333 | openSoftware und SystemEntwicklung Facsimile: (936) 715-9339 | http://www.opensuse.org/ www.rankinlawfirm.com | -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org