Unlike the usual ssh scanners who try like 10 times with different usernames (root, test, guest and such) the machine my blog is on has been experiencing an brute force ssh attack for over an our now. Logcheck fortunately reported this to me, so i added the offender (210.205.6.157, hanaro.com) to the iptables firewall. Sorry to take away the fun for you.

This makes 724 attempts to login as root via ssh in about 1 hour.

Assuming i would only use the 62 (26+26+10) standard characters in passwords he would only take like 10^11 more hours to guess the password. Good luck. Expect me to change the password a couple of times inbetween. I’ll go get some popcorn. Did i mention my password is not in a dictionary? And next time please choose the SELinux machine.

Oh, and did i mention it took me less than a second to log in. Using a ssh key of course. Maybe i don’t allow password root logins, would that be cheating on you?