<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://www.webmaster-forums.net/crss/node/1028861" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title></title>
    <link>https://www.webmaster-forums.net/crss/node/1028861</link>
    <description></description>
    <language>en</language>
          <item>
    <title>New Research</title>
    <link>https://www.webmaster-forums.net/server-management/apache-ip-trappingblocking-bad-bots-and-hackers#comment-1169550</link>
    <description> &lt;p&gt;I have been doing some research on this and from what I have found I can use the hosts.allow file and allow the block of IP&#039;s I would get from my ISP. From what I understand once that block of IP&#039;s (3 or 4 lines of code) is in the hosts.allow file nobody could access SSH from an IP not in that block. I have also read there are different apps that will monitor SSH port 22 and will write an IP to the iptable, people which have either tried multiple logins in either a specified time frame or x amount of login failures will end up with thier IP added to the IP table and they won&#039;t be able to waste system resources.&lt;br /&gt;
Using this should provide dual security on SSH with autoblocking features.&lt;/p&gt;
&lt;p&gt;Data2050&lt;/p&gt;
 </description>
     <pubDate>Wed, 13 Apr 2005 23:10:45 +0000</pubDate>
 <dc:creator>Data2050</dc:creator>
 <guid isPermaLink="false">comment 1169550 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/apache-ip-trappingblocking-bad-bots-and-hackers#comment-1169543</link>
    <description> &lt;blockquote class=&quot;bb-quote-body&quot;&gt;&lt;p&gt;&lt;strong&gt;mairving wrote:&lt;/strong&gt; I wouldn&#039;t really suggest that. Most of us don&#039;t have a fixed IP address. If you set it up to allow access from your cable connection and then that address changed, you would be locked out. Since you can&#039;t physically go to the server, you would have to get your host to reset it.&lt;/p&gt;
&lt;p&gt;A better option which is the default in BSD is to not allow root access via SSH. This way someone can hammer away at the root password all day long and even if they guessed it, still not get in. Use a username that is not easy to determine either and go su (superuser) if you need to do something as root.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;Yes, that is true. I have a fixed IP, so I kind of forgot that most people don&#039;t...&lt;/p&gt;
 </description>
     <pubDate>Wed, 13 Apr 2005 20:35:46 +0000</pubDate>
 <dc:creator>cpellizzi</dc:creator>
 <guid isPermaLink="false">comment 1169543 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/apache-ip-trappingblocking-bad-bots-and-hackers#comment-1169523</link>
    <description> &lt;blockquote class=&quot;bb-quote-body&quot;&gt;&lt;p&gt;&lt;strong&gt;andy206uk wrote:&lt;/strong&gt; Have a look into something called portknocking. It makes it impossible to login without first &quot;knocking&quot; a special combination of ports before you login. It would probably get tedious but I&#039;ve heard it really makes it tough for people to get in.&lt;/p&gt;
&lt;p&gt;Info here: &lt;a href=&quot;http://www.portknocking.org/&quot; class=&quot;bb-url&quot;&gt;http://www.portknocking.org/&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;Hi andy206uk,&lt;br /&gt;
I looked at portnocking and found they said this:&lt;/p&gt;
&lt;p&gt;Applicability&lt;br /&gt;
Port knocking is a suitable form of hardening hosts that house users who require continual access to services and data from any location and &lt;strong&gt;that are not running public services, such as SMTP   or HTTP   &lt;/strong&gt; . Port knocking is used to keep all ports closed to public traffic while flexibly opening and closing ports to traffic from users who have authenticated themselves with a knock sequence.&lt;/p&gt;
&lt;p&gt;So if I understand what they are saying Port knocking shouldn&#039;t be used on a webserver running public services, such as SMTP and HTTP because of the ports SMTP and HTTP use.&lt;/p&gt;
&lt;p&gt;Thanks,&lt;br /&gt;
Data2050&lt;/p&gt;
 </description>
     <pubDate>Wed, 13 Apr 2005 16:32:31 +0000</pubDate>
 <dc:creator>Data2050</dc:creator>
 <guid isPermaLink="false">comment 1169523 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/apache-ip-trappingblocking-bad-bots-and-hackers#comment-1169519</link>
    <description> &lt;p&gt;Have a look into something called portknocking. It makes it impossible to login without first &quot;knocking&quot; a special combination of ports before you login. It would probably get tedious but I&#039;ve heard it really makes it tough for people to get in.&lt;/p&gt;
&lt;p&gt;Info here: &lt;a href=&quot;http://www.portknocking.org/&quot; class=&quot;bb-url&quot;&gt;http://www.portknocking.org/&lt;/a&gt;&lt;/p&gt;
 </description>
     <pubDate>Wed, 13 Apr 2005 15:02:04 +0000</pubDate>
 <dc:creator>andy206uk</dc:creator>
 <guid isPermaLink="false">comment 1169519 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/apache-ip-trappingblocking-bad-bots-and-hackers#comment-1169511</link>
    <description> &lt;p&gt;thanks for the info, I agree setting a fixed IP address for admin wouldn&#039;t work.&lt;br /&gt;
I have found this &lt;a href=&quot;http://www.pettingers.org/code/SSHBlack.html&quot; class=&quot;bb-url&quot;&gt;http://www.pettingers.org/code/SSHBlack.html&lt;/a&gt;&lt;br /&gt;
I have heard using hosts.deny will help but not completly.&lt;br /&gt;
any comments on this?&lt;/p&gt;
&lt;p&gt;Thanks&lt;br /&gt;
Data2050&lt;/p&gt;
 </description>
     <pubDate>Wed, 13 Apr 2005 14:11:20 +0000</pubDate>
 <dc:creator>Data2050</dc:creator>
 <guid isPermaLink="false">comment 1169511 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/apache-ip-trappingblocking-bad-bots-and-hackers#comment-1169490</link>
    <description> &lt;blockquote class=&quot;bb-quote-body&quot;&gt;&lt;p&gt;&lt;strong&gt;cpellizzi wrote:&lt;/strong&gt; If you are having trouble, I used webmin to set up all of my firewall stuff (&lt;a href=&quot;http://www.webmin.org&quot; class=&quot;bb-url&quot;&gt;webmin.org&lt;/a&gt;). You should just allow ssh access from one IP, that is what I would do in that situation.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;I wouldn&#039;t really suggest that. Most of us don&#039;t have a fixed IP address. If you set it up to allow access from your cable connection and then that address changed, you would be locked out. Since you can&#039;t physically go to the server, you would have to get your host to reset it.&lt;/p&gt;
&lt;p&gt;A better option which is the default in BSD is to not allow root access via SSH. This way someone can hammer away at the root password all day long and even if they guessed it, still not get in. Use a username that is not easy to determine either and go su (superuser) if you need to do something as root.&lt;/p&gt;
 </description>
     <pubDate>Wed, 13 Apr 2005 12:35:09 +0000</pubDate>
 <dc:creator>mairving</dc:creator>
 <guid isPermaLink="false">comment 1169490 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/apache-ip-trappingblocking-bad-bots-and-hackers#comment-1169450</link>
    <description> &lt;p&gt;If you are having trouble, I used webmin to set up all of my firewall stuff (&lt;a href=&quot;http://www.webmin.org&quot; class=&quot;bb-url&quot;&gt;webmin.org&lt;/a&gt;). You should just allow ssh access from one IP, that is what I would do in that situation.&lt;/p&gt;
 </description>
     <pubDate>Wed, 13 Apr 2005 00:10:55 +0000</pubDate>
 <dc:creator>cpellizzi</dc:creator>
 <guid isPermaLink="false">comment 1169450 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/apache-ip-trappingblocking-bad-bots-and-hackers#comment-1169434</link>
    <description> &lt;p&gt;Do be careful when setting up Firewall rules particularly on a remote computer, since you could potentially lock yourself out.&lt;/p&gt;
 </description>
     <pubDate>Tue, 12 Apr 2005 21:28:29 +0000</pubDate>
 <dc:creator>mairving</dc:creator>
 <guid isPermaLink="false">comment 1169434 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/apache-ip-trappingblocking-bad-bots-and-hackers#comment-1169433</link>
    <description> &lt;blockquote class=&quot;bb-quote-body&quot;&gt;&lt;p&gt;&lt;strong&gt;Data2050 wrote:&lt;/strong&gt; Hello,&lt;br /&gt;
what I have been seeing is people trying to get access to my server through sshd. they are using multiple names and passwords and probably brute force apps.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;Neither Apache or PHP can block SSH attacks, separate program, separate port. All they could do is block access to your site.&lt;/p&gt;
&lt;p&gt;What kind of OS?&lt;/p&gt;
&lt;p&gt;If Linux, you can use &lt;a href=&quot;http://www.netadmintools.com/part216.html&quot; class=&quot;bb-url&quot;&gt;IP Tables&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If FreeBSD, you can use &lt;a href=&quot;http://bsdvault.net/sections.php?op=viewarticle&amp;amp;artid=6&quot; class=&quot;bb-url&quot;&gt;IPFW&lt;/a&gt; or IPFILTERS to firewall and alternately drop any packets coming from a certain IP address or block.&lt;/p&gt;
 </description>
     <pubDate>Tue, 12 Apr 2005 21:26:25 +0000</pubDate>
 <dc:creator>mairving</dc:creator>
 <guid isPermaLink="false">comment 1169433 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/apache-ip-trappingblocking-bad-bots-and-hackers#comment-1169431</link>
    <description> &lt;p&gt;Sorry not sure how to solve your problem but you do need to be careful blocking by IP, especially if you plan to block by IP range as most attacks would be coming from proxie servers. ALso what you do with the bad bots etc, if you send them round in circles or give them fake lists or a never ending file to suck on, you&#039;re using up what can be valuable resources that could be used better else where.&lt;/p&gt;
 </description>
     <pubDate>Tue, 12 Apr 2005 20:54:10 +0000</pubDate>
 <dc:creator>Busy</dc:creator>
 <guid isPermaLink="false">comment 1169431 at https://www.webmaster-forums.net</guid>
  </item>
  </channel>
</rss>
