Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 20 Sep 2011 00:12:04 +0400
From:      =?koi8-r?B?59LJx8/S2MXXIOHMxcvTwc7E0g==?= <mr.festin@yandex.ru>
To:        James Strother <jstrother9109@gmail.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: limit number of ssh connections
Message-ID:  <54071316463124@web60.yandex.ru>
In-Reply-To: <CAAOvGP3uPgcA2L%2B3%2BaLuAkyy3m72L3fxeDbt67gF1iC2xPMitQ@mail.gmail.com>
References:  <CAAOvGP2Gj0=ZAYZn2KZYUa3NTCHVtUdtQqHumM1D5Ea26dzPrQ@mail.gmail.com> <946851316461449@web97.yandex.ru> <CAAOvGP3uPgcA2L%2B3%2BaLuAkyy3m72L3fxeDbt67gF1iC2xPMitQ@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Standard inetd(8) has many options including limiting connections based on IP-address. Can it help in this case?

20.09.2011, 00:02, "James Strother" <jstrother9109@gmail.com>:
> That's an interesting project, I hadn't realized port knocking had
> become so easy to use.
>
> Unfortunately, for this particular server, I need to be able to
> provide a simple way for (a very limited number of) users to login
> into the system remotely using a variety of OS platforms. šSo I don't
> think port knocking is a good fit here.
>
> Thanks,
> ššJim
>
> 2011/9/19 çŇÉÇĎŇŘĹ× áĚĹËÓÁÎÄŇ <mr.festin@yandex.ru>:
>
>> šIf your target is protect freebsd box from bruting passwords from inet maybe security/knockd will help you?
>>
>> š19.09.2011, 23:05, "James Strother" <jstrother9109@gmail.com>:
>>> šDoes anyone know a good way of limiting the number of ssh attempts
>>> šfrom a single IP address?
>>>
>>> šI found the following website, which describes a variety of approaches:
>>>
>>> šhttp://www.freebsdwiki.net/index.php/Block_repeated_illegal_or_failed_SSH_logins
>>>
>>> šBut I am honestly not really happy with any of them. šContinuously
>>> špolling log files for regex hits seems...well crude. šJust to give you
>>> šan idea of what I mean, here were some of the issues I had. The
>>> šsshd-scan.sh script allows IPs to be reinstated, but the timing is
>>> šdependent on how frequently you rotate logs. šsshguard has a pretty
>>> šwebsite, but I can't actually find much useful documentation on how to
>>> šconfigure it. šfail2ban looks like it might work with sufficient work,
>>> šbut the defaults are terrible. šBy default, every time an IP is
>>> šreinstated, all IPs are reinstated. šNot to mention, at present I
>>> šcan't seem to get it to trigger any hits.
>>>
>>> šI suppose I could keep shopping, but the truth is I just think polling
>>> šlog files is the wrong way to solve the problem. šAnything based on
>>> šthis approach is going to have a long latency and be highly dependent
>>> šon the unspecified and unstable formatting of log files (see
>>> šhttp://www.fail2ban.org/wiki/index.php/HOWTO_Mac_OS_X_Server_(10.4)
>>> šand the troubles an exclamation point can cause).
>>>
>>> šI would much much rather do something like this:
>>>
>>> šhttp://kevin.vanzonneveld.net/techblog/article/block_brute_force_attacks_with_iptables/
>>>
>>> šDoes anyone know a way to do something similar with ipfw?
>>>
>>> šThanks in advance,
>>> šššJim
>>> š_______________________________________________
>>> šfreebsd-questions@freebsd.org mailing list
>>> šhttp://lists.freebsd.org/mailman/listinfo/freebsd-questions
>>> šTo unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"
>
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54071316463124>