From owner-freebsd-questions@FreeBSD.ORG Tue Mar 15 05:04:46 2005 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 4EBE816A4CE for ; Tue, 15 Mar 2005 05:04:46 +0000 (GMT) Received: from wproxy.gmail.com (wproxy.gmail.com [64.233.184.207]) by mx1.FreeBSD.org (Postfix) with ESMTP id 309C943D4C for ; Tue, 15 Mar 2005 05:04:43 +0000 (GMT) (envelope-from kljgroups@gmail.com) Received: by wproxy.gmail.com with SMTP id 68so2523wra for ; Mon, 14 Mar 2005 21:04:40 -0800 (PST) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:mime-version:content-type:content-transfer-encoding; b=o8Zr0eYzEJMhRYk7voUmXkvOoxjpw+SahizO7ELMo1OxEtTrowB9GRusdXR0iuIEI+aI9SVjXMcW6RBeflCybNzq3KYLmu0wNrV7lyXQZqvfzH+wtYIYMM3BbYSJBadLQuQed/pP7XN53T73rQhyvuIuiOeoTOqyRKfy5adUh10= Received: by 10.38.97.35 with SMTP id u35mr1308066rnb; Mon, 14 Mar 2005 05:04:30 -0800 (PST) Received: by 10.38.75.36 with HTTP; Mon, 14 Mar 2005 05:04:30 -0800 (PST) Message-ID: Date: Mon, 14 Mar 2005 08:04:30 -0500 From: Kyle Jensen To: freebsd-questions@freebsd.org Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Subject: Cutting down on ssh breakin attempts X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: Kyle Jensen List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 Mar 2005 05:04:46 -0000 Hi, I run a webmail server for a small company, which is (of course) running FreeBSD 5-stable. I get about 50-100 failed loging attempts via ssh on a daily basis. Occasionally, these show up in my daily security digest with messages like: reverse mapping checking getaddrinfo for h169-210-68-8.a dcast.com.tw failed - POSSIBLE BREAKIN ATTEMPT! But mostly it's stuff like Illegal user postgres from 210.68.8.169 What's the best way to cut down on these attempts? I thought about adding a blacklist to my pf.conf rules for the pf firewall. Any thoughts would be greatly appreciated! Kyle