From owner-freebsd-questions@FreeBSD.ORG Sat Mar 18 20:35:39 2006 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0845B16A400 for ; Sat, 18 Mar 2006 20:35:39 +0000 (UTC) (envelope-from chris@chrismaness.com) Received: from ns1.internetinsite.com (ns1.internetinsite.com [208.179.97.2]) by mx1.FreeBSD.org (Postfix) with ESMTP id C425143D6D for ; Sat, 18 Mar 2006 20:35:37 +0000 (GMT) (envelope-from chris@chrismaness.com) Received: from [71.83.198.191] (71-83-198-191.dhcp.rvsd.ca.charter.com [71.83.198.191]) by ns1.internetinsite.com (8.13.4/8.13.4) with ESMTP id k2IKZZ4m055977; Sat, 18 Mar 2006 12:35:36 -0800 (PST) (envelope-from chris@chrismaness.com) Message-ID: <441C6F10.9020403@chrismaness.com> Date: Sat, 18 Mar 2006 12:35:28 -0800 From: Chris Maness User-Agent: Thunderbird 1.5 (Windows/20051201) MIME-Version: 1.0 To: Wes Santee References: <441C45BA.1030106@chrismaness.com> <441C4ABC.2090102@gmail.com> In-Reply-To: <441C4ABC.2090102@gmail.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-questions@freebsd.org Subject: Re: How to Stop Bruit Force ssh Attempts? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 18 Mar 2006 20:35:39 -0000 Wes Santee wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > Chris Maness wrote: > >> In my auth log I see alot of bruit force attempts to login via ssh. Is >> there a way I can have the box automatically kill any tcp/ip >> connectivity to hosts that try and fail a given number of times? Is >> there a port or something that I can install to give this kind of >> protection. I'm still kind of a FreeBSD newbie. >> > > security/bruteforeceblocker (requires pf as the firewall) > > security/denyhosts (uses tcp_wrappers and /etc/hosts.allow) > > security/sshit (requires ipfw as firewall) > > I rolled my own solution and haven't used any of these, so I don't know > how well they work in practice. They probably all require some initial > setup and configuration. > > Cheers, > - -Wes > > Thanks, I played with all three. Denyhosts is the best hands down.