On 11/11/2015 10:27 AM, Roger Oberholtzer wrote:
[...]. Since I do not know from where I will use ssh, it is unclear how I could restrict the attempts.
As Per wrote, you could use something like fail2ban. Tools like that are watching the syslog, and block offending IPs for a certain time. I've written my own version doing something similar, which does: * limit the number of login attempts per minute per firewall, * block IPs which try to login as root, * block IPs which try to login as a non-"AllowUser" * block IPs which try using a wrong password >2-3 times * block IPs which otherwise produce strange sshd log entries Blocking lasts for a certain time, and seems to be quite effective. As a general hint, you could also do: * use a different sshd port, * disallow password logins, * permit only a non-privileged user. Have a nice day, Berny -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org