On Saturday 22 November 2008, David C. Rankin wrote:
I'll have a look, but I kinda liked my temporary solution for the immediate problem. But, I have to admit, hitting :w was kind of scary from the other end of the connection. I didn't know if I was going to nuke myself or not. Thankfully, linux is smarter than that and won't disconnect established connections on changes to hosts.allow
Hi David, Nice solution ;-) I think what you are looking for, is the package denyhosts (http://denyhosts.sourceforge.net/). I used to use it for my sshd monitoring and it's actually very good at it, even exchanges blocked IP's with others if you want it to. Then I discoverd fail2ban, which has an openSUSE rpm (is in the repos even) and also can monitor other servers, like ftp and http. When I learned that, I switched to fail2ban. But if you only need you ssh daemon monitored, there's no reason not to use denyhosts. It gets the job done. HTH, Joop