Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 Jan 2005 16:30:07 -0500
From:      daniel quinn <freebsd@danielquinn.org>
To:        freebsd-questions@freebsd.org
Subject:   Re: Blacklisting IPs
Message-ID:  <200501101630.08020.freebsd@danielquinn.org>
In-Reply-To: <fd091951050109222052228399@mail.gmail.com>
References:  <20050110035717.27062.qmail@web41008.mail.yahoo.com> <fd091951050109222052228399@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On January 10, 2005 01:20 am, artware wrote:
> My 5.3R system has only been up a little over a week, and I've already
> had a few breakin attempts -- they show up as Illegal user tests in
> the /var/log/auth.log... It looks like they're trying common login
> names (probably with the login name used as passwd). It takes them
> hours to try a dozen names, but I'd rather not have any traffic from
> these folks. Is there any way to blacklist IPs at the system level, or
> do I have to hack something together for each daemon?

i have three suggestions for this:

 1) edit sshd_config to set PermitRootLogin to "no".  since root is the only 
user on your system that obviously exists elsewhere, this is a nice start

 2) setup sshd to allow connections with keys only.  then go buy yourself a 
usb key and keep your private key on there when you connect.

 3) use a port-knocking daemon:
    http://www.portknocking.org/
    http://www.zeroflux.org/knock/

-- 
those who say it cannot be done
should not interrupt the person doing it
  - unknown



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200501101630.08020.freebsd>