Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 18 Mar 2006 12:35:28 -0800
From:      Chris Maness <chris@chrismaness.com>
To:        Wes Santee <wsantee@gmail.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: How to Stop Bruit Force ssh Attempts?
Message-ID:  <441C6F10.9020403@chrismaness.com>
In-Reply-To: <441C4ABC.2090102@gmail.com>
References:  <441C45BA.1030106@chrismaness.com> <441C4ABC.2090102@gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Wes Santee wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Chris Maness wrote:
>   
>> In my auth log I see alot of bruit force attempts to login via ssh.  Is
>> there a way I can have the box automatically kill any tcp/ip
>> connectivity to hosts that try and fail a given number of times?  Is
>> there a port or something that I can install to give this kind of
>> protection.  I'm still kind of a FreeBSD newbie.
>>     
>
> security/bruteforeceblocker (requires pf as the firewall)
>
> security/denyhosts (uses tcp_wrappers and /etc/hosts.allow)
>
> security/sshit (requires ipfw as firewall)
>
> I rolled my own solution and haven't used any of these, so I don't know
> how well they work in practice.  They probably all require some initial
> setup and configuration.
>
> Cheers,
> - -Wes
>
>   
Thanks, I played with all three. Denyhosts is the best hands down.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?441C6F10.9020403>