Date: Mon, 10 Jan 2005 16:30:07 -0500 From: daniel quinn <freebsd@danielquinn.org> To: freebsd-questions@freebsd.org Subject: Re: Blacklisting IPs Message-ID: <200501101630.08020.freebsd@danielquinn.org> In-Reply-To: <fd091951050109222052228399@mail.gmail.com> References: <20050110035717.27062.qmail@web41008.mail.yahoo.com> <fd091951050109222052228399@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On January 10, 2005 01:20 am, artware wrote:
> My 5.3R system has only been up a little over a week, and I've already
> had a few breakin attempts -- they show up as Illegal user tests in
> the /var/log/auth.log... It looks like they're trying common login
> names (probably with the login name used as passwd). It takes them
> hours to try a dozen names, but I'd rather not have any traffic from
> these folks. Is there any way to blacklist IPs at the system level, or
> do I have to hack something together for each daemon?
i have three suggestions for this:
1) edit sshd_config to set PermitRootLogin to "no". since root is the only
user on your system that obviously exists elsewhere, this is a nice start
2) setup sshd to allow connections with keys only. then go buy yourself a
usb key and keep your private key on there when you connect.
3) use a port-knocking daemon:
http://www.portknocking.org/
http://www.zeroflux.org/knock/
--
those who say it cannot be done
should not interrupt the person doing it
- unknown
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200501101630.08020.freebsd>
