From owner-freebsd-questions@FreeBSD.ORG Wed Apr 12 04:13:13 2006 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id EABA816A401 for ; Wed, 12 Apr 2006 04:13:13 +0000 (UTC) (envelope-from chris@chrismaness.com) Received: from ylpvm12.prodigy.net (ylpvm12-ext.prodigy.net [207.115.57.43]) by mx1.FreeBSD.org (Postfix) with ESMTP id 0B28143D48 for ; Wed, 12 Apr 2006 04:13:12 +0000 (GMT) (envelope-from chris@chrismaness.com) Received: from pimout7-ext.prodigy.net (pimout7-int.prodigy.net [207.115.4.147]) by ylpvm12.prodigy.net (8.12.10 outbound/8.12.10) with ESMTP id k3C4D4bJ015931 for ; Wed, 12 Apr 2006 00:13:05 -0400 X-ORBL: [69.238.212.56] Received: from [192.168.4.100] (ppp-69-238-212-56.dsl.irvnca.pacbell.net [69.238.212.56]) by pimout7-ext.prodigy.net (8.13.6 out.dk/8.13.6) with ESMTP id k3C4D5s2194308; Wed, 12 Apr 2006 00:13:10 -0400 Message-ID: <443C7E26.2000803@chrismaness.com> Date: Tue, 11 Apr 2006 21:12:22 -0700 From: Chris Maness User-Agent: Mozilla Thunderbird 1.0.7 (X11/20051013) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Jonathan Franks References: <441C45BA.1030106@chrismaness.com> <894280FF-CB83-4EEA-9CAD-422A34068354@taconic.net> In-Reply-To: <894280FF-CB83-4EEA-9CAD-422A34068354@taconic.net> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-questions@freebsd.org Subject: Re: How to Stop Bruit Force ssh Attempts? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Apr 2006 04:13:14 -0000 Jonathan Franks wrote: > > On Mar 18, 2006, at 12:39 PM, Chris Maness wrote: > >> In my auth log I see alot of bruit force attempts to login via ssh. >> Is there a way I can have the box automatically kill any tcp/ ip >> connectivity to hosts that try and fail a given number of times? Is >> there a port or something that I can install to give this kind of >> protection. I'm still kind of a FreeBSD newbie. > > > If you are using PF, you can use source tracking to drop the > offenders in to a table... perhaps after a certain number of attempts > in a given time (say, 5 in a minute). Once you have the table you're > in business... you can block based on it... and then set up a cron > job to copy the table to disk every so often (perhaps once every two > minutes). It works very well for me, YMMV. > > If you don't want to block permanently, you could use cron to flush > the table every so often too... I don't bother though. > > -Jonathan I use a port called DenyHost. It adds an entry to hosts.allow that denies access.