• Plesk Uservoice will be deprecated by October. Moving forward, all product feature requests and improvement suggestions will be managed through our new platform Plesk Productboard.
    To continue sharing your ideas and feedback, please visit features.plesk.com

SSH Last failed login: How to Improve security ??

Peter_R

Basic Pleskian
Hello i have a fresh Host Edition Installation and it was runing for about a week.
This is my second time i logged in to my server using SSH this week, and i noticed alarming message.

"Last failed login: Sun Jan 31 22:32:35 EST 2016 from xxx.xxx.142.71 on ssh:notty
There were 42278 failed login attempts since the last successful login."

Looks like there are a lot of hits on my server SSH port.

How can i increase the security to prevent hacking or someone trying to abuse my ssh connection?
Any advise?

I am newbie.
Thanks
 
Thank you for your reply
very helpful

also would be ok to change SSH port under Centos7 ? or not recommende?
i wonder if port change might affect any Plesk Functionality ?

Thanks
 
Hi,
would be ok to change SSH port under Centos7

I've changed the ssh-Port to an unusual port (in /etc/ssh/sshd_config). I closed port 22 in the firewall an opened the "unusual" port.
Additional I add a "special" user with a normal shell (/bin/bash) who is allowed to login. "root" is disabled to login via ssh on default.

fail2ban is a good choice too. ;-)

best regards
Holger
 
Thank you i used fail2ban and seems to be under control , ips get banned and if someone is persistent i am adding their ip to block list on my Zywall :)
 
Back
Top