From owner-freebsd-questions@FreeBSD.ORG Wed Sep 20 13:54:24 2006 Return-Path: X-Original-To: questions@freebsd.org Delivered-To: freebsd-questions@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 8148416A4D2 for ; Wed, 20 Sep 2006 13:54:24 +0000 (UTC) (envelope-from esavage@reyrey.net) Received: from mailrtr04.reyrey.net (mailrtr04.reyrey.net [205.157.244.8]) by mx1.FreeBSD.org (Postfix) with ESMTP id 1C72943D53 for ; Wed, 20 Sep 2006 13:54:23 +0000 (GMT) (envelope-from esavage@reyrey.net) Date: Wed, 20 Sep 2006 09:55:08 -0400 From: Elijah Savage In-reply-to: <70e8236f0609191412p5779d94cqa16df5631f4de916@mail.gmail.com> To: Joao Barros Message-id: <4511483C.6080607@reyrey.net> MIME-version: 1.0 Content-type: text/plain; charset=ISO-8859-1; format=flowed Content-transfer-encoding: 7BIT User-Agent: Thunderbird 1.5.0.7 (Windows/20060909) References: <20060919165400.A4380@prime.gushi.org> <70e8236f0609191412p5779d94cqa16df5631f4de916@mail.gmail.com> Cc: questions@freebsd.org Subject: Re: sshd brute force attempts? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 20 Sep 2006 13:54:24 -0000 Joao Barros wrote: > On 9/19/06, Dan Mahoney, System Admin wrote: >> Hey all, >> >> I've looked around and found several linux-centric things designed to >> block brute-force SSH attempts. Anyone out there know of something a >> bit >> more BSD savvy? >> >> My best attempt will be to get this: >> >> http://www.csc.liv.ac.uk/~greg/sshdfilter/index_15.html >> >> running and adapt it. >> >> I've found a few things based on openBSD's pf, but that doesn't seem >> to be >> the default in BSD either. >> >> Any response appreciated. >> > > I'm using BruteForceBlocker quite successfully. > I take the opportunity to thank danger for it :-) > > http://www.freshports.org/security/bruteforceblocker/ > I use /usr/ports/security/denyhost It was very easy to install and setup the config file is commented so well and has so many different parameters. I get reports like this anytime my thresholds are crossed. Added the following hosts to /etc/hosts.deniedssh: 124.107.6.37 (124.107.6.37.pldt.net)