Date: Sat, 27 Jan 2007 12:07:31 +0100 From: peter@bsdly.net (Peter N. M. Hansteen) To: freebsd-questions@freebsd.org Subject: Re: thwarting repeated login attempts Message-ID: <87lkjosp70.fsf@thingy.datadok.no> In-Reply-To: <200701261654.59814.pmatulis@sympatico.ca> (Peter Matulis's message of "Fri, 26 Jan 2007 16:54:59 -0500") References: <200701261654.59814.pmatulis@sympatico.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
Peter Matulis <pmatulis@sympatico.ca> writes: > You can run OpenBSD's pf in combination with authpf. This mechanism > will alter firewall rules based on successful SSH logins. authpf is great, but even overload rules can go a long way towards eliminating the original poster's problem, see eg the suggestions in my tutorial at http://home.nuug.no/~peter/pf/en/bruteforce.html (http://home.nuug.no/~peter/pf/ for the full manuscript in a variety of formats). -- Peter N. M. Hansteen, member of the first RFC 1149 implementation team http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/ "First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales" delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?87lkjosp70.fsf>