Date: Tue, 20 Sep 2011 00:12:04 +0400 From: =?koi8-r?B?59LJx8/S2MXXIOHMxcvTwc7E0g==?= <mr.festin@yandex.ru> To: James Strother <jstrother9109@gmail.com> Cc: freebsd-questions@freebsd.org Subject: Re: limit number of ssh connections Message-ID: <54071316463124@web60.yandex.ru> In-Reply-To: <CAAOvGP3uPgcA2L%2B3%2BaLuAkyy3m72L3fxeDbt67gF1iC2xPMitQ@mail.gmail.com> References: <CAAOvGP2Gj0=ZAYZn2KZYUa3NTCHVtUdtQqHumM1D5Ea26dzPrQ@mail.gmail.com> <946851316461449@web97.yandex.ru> <CAAOvGP3uPgcA2L%2B3%2BaLuAkyy3m72L3fxeDbt67gF1iC2xPMitQ@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Standard inetd(8) has many options including limiting connections based on IP-address. Can it help in this case? 20.09.2011, 00:02, "James Strother" <jstrother9109@gmail.com>: > That's an interesting project, I hadn't realized port knocking had > become so easy to use. > > Unfortunately, for this particular server, I need to be able to > provide a simple way for (a very limited number of) users to login > into the system remotely using a variety of OS platforms. šSo I don't > think port knocking is a good fit here. > > Thanks, > ššJim > > 2011/9/19 çŇÉÇĎŇŘĹ× áĚĹËÓÁÎÄŇ <mr.festin@yandex.ru>: > >> šIf your target is protect freebsd box from bruting passwords from inet maybe security/knockd will help you? >> >> š19.09.2011, 23:05, "James Strother" <jstrother9109@gmail.com>: >>> šDoes anyone know a good way of limiting the number of ssh attempts >>> šfrom a single IP address? >>> >>> šI found the following website, which describes a variety of approaches: >>> >>> šhttp://www.freebsdwiki.net/index.php/Block_repeated_illegal_or_failed_SSH_logins >>> >>> šBut I am honestly not really happy with any of them. šContinuously >>> špolling log files for regex hits seems...well crude. šJust to give you >>> šan idea of what I mean, here were some of the issues I had. The >>> šsshd-scan.sh script allows IPs to be reinstated, but the timing is >>> šdependent on how frequently you rotate logs. šsshguard has a pretty >>> šwebsite, but I can't actually find much useful documentation on how to >>> šconfigure it. šfail2ban looks like it might work with sufficient work, >>> šbut the defaults are terrible. šBy default, every time an IP is >>> šreinstated, all IPs are reinstated. šNot to mention, at present I >>> šcan't seem to get it to trigger any hits. >>> >>> šI suppose I could keep shopping, but the truth is I just think polling >>> šlog files is the wrong way to solve the problem. šAnything based on >>> šthis approach is going to have a long latency and be highly dependent >>> šon the unspecified and unstable formatting of log files (see >>> šhttp://www.fail2ban.org/wiki/index.php/HOWTO_Mac_OS_X_Server_(10.4) >>> šand the troubles an exclamation point can cause). >>> >>> šI would much much rather do something like this: >>> >>> šhttp://kevin.vanzonneveld.net/techblog/article/block_brute_force_attacks_with_iptables/ >>> >>> šDoes anyone know a way to do something similar with ipfw? >>> >>> šThanks in advance, >>> šššJim >>> š_______________________________________________ >>> šfreebsd-questions@freebsd.org mailing list >>> šhttp://lists.freebsd.org/mailman/listinfo/freebsd-questions >>> šTo unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org" > > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54071316463124>