Date: Fri, 12 Nov 2004 23:32:21 -0800 From: "Ted Mittelstaedt" <tedm@toybox.placo.com> To: "dave" <dmehler26@woh.rr.com>, <freebsd-questions@freebsd.org> Cc: Drew Tomlinson <drew@mykitchentable.net> Subject: RE: limiting ssh logins Message-ID: <LOBBIFDAGNMAMLGJJCKNMEKHEPAA.tedm@toybox.placo.com> In-Reply-To: <000501c4c934$21a46200$0200a8c0@satellite>
next in thread | previous in thread | raw e-mail | index | archive | help
See the MaxStartups parameter in the sshd_confg. Ted > -----Original Message----- > From: owner-freebsd-questions@freebsd.org > [mailto:owner-freebsd-questions@freebsd.org]On Behalf Of dave > Sent: Friday, November 12, 2004 7:52 PM > To: freebsd-questions@freebsd.org > Cc: Drew Tomlinson > Subject: limiting ssh logins > > > Hello, > I'm wondering if it's possible to use pam or perhaps tcp_wrappers to > limit how many ssh logins can be atempted? I'd like to kick off a user who > tries to log in repeatedly with the wrong password or tries x > times within a > minute, my purpose is to slow down hacking atempts in situations where > public key authentication is not possible. > Thanks. > Dave. > > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to > "freebsd-questions-unsubscribe@freebsd.org" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?LOBBIFDAGNMAMLGJJCKNMEKHEPAA.tedm>