From owner-freebsd-questions@FreeBSD.ORG Fri Jun 18 15:59:31 2010 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id C114E106566B for ; Fri, 18 Jun 2010 15:59:31 +0000 (UTC) (envelope-from glarkin@FreeBSD.org) Received: from mail1.sourcehosting.net (113901-app1.sourcehosting.net [72.32.213.11]) by mx1.freebsd.org (Postfix) with ESMTP id 9CD418FC0A for ; Fri, 18 Jun 2010 15:59:31 +0000 (UTC) Received: from 68-189-245-235.dhcp.oxfr.ma.charter.com ([68.189.245.235] helo=cube.entropy.prv) by mail1.sourcehosting.net with esmtp (Exim 4.69 (FreeBSD)) (envelope-from ) id 1OPdyP-000KNX-4E; Fri, 18 Jun 2010 11:59:20 -0400 Received: from [127.0.0.1] (fireball.entropy.prv [192.168.1.12]) by cube.entropy.prv (Postfix) with ESMTP id A771B417A554; Fri, 18 Jun 2010 11:59:16 -0400 (EDT) Message-ID: <4C1B97D3.7080704@FreeBSD.org> Date: Fri, 18 Jun 2010 11:59:15 -0400 From: Greg Larkin Organization: The FreeBSD Project User-Agent: Thunderbird 2.0.0.24 (Windows/20100228) MIME-Version: 1.0 To: Kaya Saman References: <367428.93212.qm@web51108.mail.re2.yahoo.com> <4C1B67B2.8000309@nrdx.com> <4C1B90CE.4020509@netscape.net> <4C1B9549.4080801@gmail.com> <4C1B95AF.4090200@netscape.net> In-Reply-To: <4C1B95AF.4090200@netscape.net> X-Enigmail-Version: 0.96.0 OpenPGP: id=1C940290 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Spam-Score: -0.3 (/) Cc: freebsd-questions@freebsd.org Subject: Re: system is under attack (what can I do more?) X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: glarkin@FreeBSD.org List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 18 Jun 2010 15:59:31 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Kaya Saman wrote: > On 18/06/2010 18:48, Glen Barber wrote: >> Hi, >> >> On 6/18/10 11:29 AM, Kaya Saman wrote: >>> [...] >>>> Look at ports/security/sshguard and ports/security/bruteblock. >>>> >>>> I use sshguard with ipfilter, but it works with pf and ipfw as well. >>>> It is very simple to set up and gets the job done. >>>> >>> >>> Hi just wanted to say thanks for stating this as I'm also looking for a >>> BSD version of fail2ban which I couldn't find in the FreeBSD ports >>> collection...... >>> >> >> security/py-fail2ban >> >> Regards, >> > Ah...... > > Thanks!! :-) > > Regards, > > Kaya The "make search" target is useful for finding ports when you only have a keyword or name to go on: # cd /usr/ports/ # make search The search target requires a keyword parameter or name parameter, e.g.: "make search key=somekeyword" or "make search name=somekeyword" # make name=fail2ban search Port: py26-fail2ban-0.8.4 Path: /usr/ports/security/py-fail2ban Info: scans log files and bans IP that makes too many password failures. Maint: tony@pc-tony.com B-deps: python26-2.6.5 R-deps: python26-2.6.5 WWW: http://www.fail2ban.org/wiki/index.php/Main_Page Hope that helps, Greg - -- Greg Larkin http://www.FreeBSD.org/ - The Power To Serve http://www.sourcehosting.net/ - Ready. Set. Code. http://twitter.com/sourcehosting/ - Follow me, follow you -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iD8DBQFMG5fT0sRouByUApARArz0AJ9cAxdoR9jAXdmliiEECguLYDrDbgCeJjCP /2niys4x+eXgooHg3uOf1gw= =GycM -----END PGP SIGNATURE-----