{"id":9293,"date":"2013-02-16T16:27:01","date_gmt":"2013-02-16T22:27:01","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=9293"},"modified":"2013-02-17T12:17:36","modified_gmt":"2013-02-17T18:17:36","slug":"welcome-to-denyhosts","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=9293","title":{"rendered":"Welcome to DenyHosts"},"content":{"rendered":"<blockquote><p>DenyHosts is a script intended to be run by Linux system administrators to help thwart SSH server attacks (also known as dictionary based attacks and brute force attacks).<\/p>\n<p>If you&#8217;ve ever looked at your ssh log (\/var\/log\/secure on Redhat, \/var\/log\/auth.log on Mandrake, etc&#8230;) you may be alarmed to see how many hackers attempted to gain access to your server. Hopefully, none of them were successful (but then again, how would you know?). Wouldn&#8217;t it be better to automatically prevent that attacker from continuing to gain entry into your system?<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/denyhosts.sourceforge.net\/\">Welcome to DenyHosts<\/a>.<\/p>\n<p>Not me.\u00a0 If I let ssh into the network I only allow it for the IP address I&#8217;m going to be accessing the network from.\u00a0 These brute force attacks are annoying.\u00a0 This little app may prove useful.\u00a0 Will look into this.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DenyHosts is a script intended to be run by Linux system administrators to help thwart SSH server attacks (also known as dictionary based attacks and brute force attacks). If you&#8217;ve ever looked at your ssh log (\/var\/log\/secure on Redhat, \/var\/log\/auth.log &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=9293\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110],"tags":[238,30,721,157],"class_list":["post-9293","post","type-post","status-publish","format-standard","hentry","category-networking","tag-firewall","tag-iptables","tag-linux-admin","tag-ssh"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/9293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9293"}],"version-history":[{"count":2,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/9293\/revisions"}],"predecessor-version":[{"id":9297,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/9293\/revisions\/9297"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9293"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}