Eviltechie Posted January 28, 2009 Share Posted January 28, 2009 At some point I'm going to set up ssh on my computer. My question though is how to stay safe. I don't want haxors trying to bruteforce me. So I came up with this idea. Send an email with your IP in it to allow access from that IP for up to 3 hours. All else would be blocked. Then I wouldn't have to worry about messing with blocking myself for incorrect password attempts, and I wouldn't have to mess with keys. Quote Link to comment Share on other sites More sharing options...
operat0r_001 Posted January 28, 2009 Share Posted January 28, 2009 I use whitelist sucks on dynamic host like phones etc .. but its for yer own good .. Quote Link to comment Share on other sites More sharing options...
Sparda Posted January 28, 2009 Share Posted January 28, 2009 http://perl.active-venture.com/lib/Net/POP3.html Write a perl script that 'reads' email in a particular account (could be a gmail account) looking for particular things with in an email that tells it which IP and any thing else you want it to do. Have the script modify the firewall/SSH configuration and restart services as necessary. Then have the script create a scheduled task that from some hours from now runs another script that removes the IP address from the firewall/ssh configuration. The script that reads email and white lists IP addresses will need to be run on a scheduled task of probably once every 5 minuets. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.