From owner-freebsd-questions@FreeBSD.ORG Tue Jan 24 23:57:55 2006 Return-Path: X-Original-To: questions@freebsd.org Delivered-To: freebsd-questions@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id CF5D416A41F for ; Tue, 24 Jan 2006 23:57:55 +0000 (GMT) (envelope-from danger@rulez.sk) Received: from mail.rulez.sk (DaEmoN.RuLeZ.sK [84.16.32.226]) by mx1.FreeBSD.org (Postfix) with ESMTP id 55BC843D45 for ; Tue, 24 Jan 2006 23:57:54 +0000 (GMT) (envelope-from danger@rulez.sk) Received: from localhost (localhost [127.0.0.1]) by mail.rulez.sk (Postfix) with ESMTP id DB4451CD2A; Wed, 25 Jan 2006 00:57:52 +0100 (CET) Received: by mail.rulez.sk (Postfix, from userid 1001) id 035A01CD1A; Wed, 25 Jan 2006 00:57:45 +0100 (CET) Date: Wed, 25 Jan 2006 00:57:44 +0100 From: Daniel Gerzo To: Ilias.Sachpazidis@igd.fraunhofer.de Message-ID: <20060124235744.GA99424@daemon.rulez.sk> References: <43D67DC9.5030509@infracaninophile.co.uk> <002401c62129$7c138e70$050a0a0a@hermes> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <002401c62129$7c138e70$050a0a0a@hermes> User-Agent: Mutt/1.4.2.1i X-Virus-Scanned: by amavisd-new at mail.rulez.sk X-Spam-Status: No, score=-2.552 tagged_above=-999 required=5 tests=[AWL=0.048, BAYES_00=-2.599, NO_RELAYS=-0.001] X-Spam-Score: -2.552 X-Spam-Level: Cc: questions@freebsd.org Subject: Re: auth.log & intruder prevention X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 24 Jan 2006 23:57:55 -0000 On Tue, Jan 24, 2006 at 10:02:26PM +0100, Ilias Sachpazidis wrote: > Hi Everyone, hello, > > In auth.log of my FreeBSD boxes I got many requests to port 22, as you can > see below. > ----begin of snippet > Jan 22 11:21:50 zeus sshd[92900]: Failed password for illegal user cracking > from 65.208.188.105 port 58344 ssh2 > Jan 22 11:21:53 zeus sshd[92902]: Failed password for illegal user hacking > from 65.208.188.105 port 58443 ssh2 > ----end of snippet > > I am wondering if any script is available to prevent hundreds of attempts on > port 22 from external IPs that constantly checking user & passwords on my > FreeBSD PCs. > > What I am looking for is a deamon application/script that receives the > recorded data from auth.log and detects if any remote client (IP address) is > checking user and passwords (Detection pattern: 5 missing attempts in 1 > min). On a successful detection, the script should add an ipfw rule > rejecting further IP packets from the specific remote address. > > Is any script or something similar available so far? I've written a BruteForceBlocer, you can install it from ports as well, check security/bruteforceblocker. Hope you will like it. -- Sincerely, Daniel Gerzo