Date: Fri, 26 Aug 2005 00:24:48 +0200 From: Maarten Sanders <maarfree@xs4all.nl> To: "'FreeBSD Questions'" <freebsd-questions@freebsd.org> Subject: Re: Illegal access attempt - FreeBSD 5.4 Release - please advise Message-ID: <1125008688.39123.14.camel@maarten> In-Reply-To: <20050825112237.GE45634@topper.cteresource.org> References: <810a540e0508232127737d91fb@mail.gmail.com> <200508241119671.SM00756@chris> <20050825112237.GE45634@topper.cteresource.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 2005-08-25 at 07:22 -0400, Lee Capps wrote: > On 11:18 Wed 24 Aug , Chris St Denis wrote: > > How can I easily auto deny after x failed attempts? Is this an sshd setting? > > I could find it. > > > > Is there something in ports that will firewall off somebody who is brute > > forcing? > > In addition to adding entries to /etc/hosts.allow you could try > DenyHosts: > > http://denyhosts.sourceforge.net/ > > I didn't find a port, but it works with FreeBSD and isn't too onerous to > install. > > HTH, > > Lee > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org" > Nice suggestion, but how do I enable tcp_wrappers with sshd? See : http://denyhosts.sourceforge.net/ssh_config.html I tried adding sshd: 127.0.0.1 : deny to /etc/hosts.allow but I failed the described test. Maarten
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1125008688.39123.14.camel>