Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Aug 2005 00:24:48 +0200
From:      Maarten Sanders <maarfree@xs4all.nl>
To:        "'FreeBSD Questions'" <freebsd-questions@freebsd.org>
Subject:   Re: Illegal access attempt - FreeBSD 5.4 Release - please advise
Message-ID:  <1125008688.39123.14.camel@maarten>
In-Reply-To: <20050825112237.GE45634@topper.cteresource.org>
References:  <810a540e0508232127737d91fb@mail.gmail.com> <200508241119671.SM00756@chris> <20050825112237.GE45634@topper.cteresource.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 2005-08-25 at 07:22 -0400, Lee Capps wrote:
> On 11:18 Wed 24 Aug     , Chris St Denis wrote:
> > How can I easily auto deny after x failed attempts? Is this an sshd setting?
> > I could find it.
> > 
> > Is there something in ports that will firewall off somebody who is brute
> > forcing?
> 
> In addition to adding entries to /etc/hosts.allow you could try
> DenyHosts:
> 
> http://denyhosts.sourceforge.net/
> 
> I didn't find a port, but it works with FreeBSD and isn't too onerous to
> install.
> 
> HTH,
> 
> Lee
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"
> 
Nice suggestion, but how do I enable tcp_wrappers with sshd?

See : http://denyhosts.sourceforge.net/ssh_config.html 
I tried adding 

sshd: 127.0.0.1 : deny to /etc/hosts.allow but I failed the described
test. 

Maarten





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1125008688.39123.14.camel>