- Jun 21, 2004
Without installing APF and BFD, what's a good way to stop these? I recently stopped the brute force attacks on SSH by changing the port. Is it possible to do something similar with FTP?
Vatoloco said:Without installing APF and BFD, what's a good way to stop these? I recently stopped the brute force attacks on SSH by changing the port. Is it possible to do something similar with FTP?
proftpd is what I'm using. Does anyone know if changing the port is going to mess anything up? I've noticed in my logs there is a consistent login and timeout from 127.0.0.1. I'm guessing that's cpanel just checking to make sure the service is active. Will changing the port prevent that from working and thus cpanel will be constantly rebooting ftp?eth00 said:Yes if are using proftpd /etc/proftpd.conf has what you need. I am not sure where the pure-ftp config files are.
Thanks!chirpy said:You could change the port chkservd uses in:
However, your next cPanel update could well overwrite the file. I've never been that much a fan of moving ports, though it does tend to avoid the skiddies, a hacker would obviously have no problems finding it.
To disable it, you'd delete the file from /etc/chkservd/ and then restart chkservd. However, cPanel upgrades will most likely recreate it.Vatoloco said:Thanks!
One more question, is there a way to just disable it from checking ftp? I could care less if FTP is down for along time. I only use it a couple times a month and if it happens to me down at those times I could just restart it myself.