|
From: James H. <jam...@gm...> - 2015-05-08 17:17:13
|
This feels like something that would be better handled with PAM. Maybe it would be enhanced by providing a flat file 'firewall' backend, something like hosts.deny PAM could reference. On May 8, 2015 10:06 AM, "Laurence Perkins (OE)" <lpe...@op...> wrote: > While we're discussing potential new features, I've noticed that nearly > all attackers hit the same list of default usernames (root, pi, ubuntu, > etc.) It would be useful to be able to specify a list of usernames that > result in an immediate block without waiting for the login to fail. > (Processing the login attempt uses a not-insignificant amount of CPU on > low-end machines like a Raspberry Pi. Blocking the connection > immediately would save quite a bit.) > > LMP > > ------------------------------------------------------------------------------ > One dashboard for servers and applications across Physical-Virtual-Cloud > Widest out-of-the-box monitoring support with 50+ applications > Performance metrics, stats and reports that give you Actionable Insights > Deep dive visibility with transaction tracing using APM Insight. > http://ad.doubleclick.net/ddm/clk/290420510;117567292;y > _______________________________________________ > Sshguard-users mailing list > Ssh...@li... > https://lists.sourceforge.net/lists/listinfo/sshguard-users > |