Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 28 Mar 2006 14:12:11 -0500
From:      nawcom <nawcom@gmail.com>
To:        freebsd-questions@freebsd.org
Subject:   ipfw secure setup for ssh bruteforcers
Message-ID:  <a832538e0603281112g3d90c847h2810642d92a90c94@mail.gmail.com>

next in thread | raw e-mail | index | archive | help
I have a pretty good setup with ipfw, and theres always dickheads constantl=
y
trying to get in - mostly through
old microsoft and ssh1/2 exploits with certain usernames and passwords. I
pretty much add their ip to a protected ban list (after 5 tries) which bans
them from the entire server.

>From any professionals, what is the most effective technique that i should
use to take care of these kiddies
other than a complete ban? Is my technique good or is it oversecure? An
admin said that doing this can be bad, especially when
the kiddy is connected to a large network like a company or university; I
may block other people who aren't guilty of the act. (which makes sense)

I use the up do date ssh so any exploits are
either patched up or will be patched when they're discovered, so holes in
the program shouldn't be in issue.

any replies would be wonderful,
Thanks,
Ben


--
"They that can give up essential liberty to obtain a little temporary safet=
y
deserve neither liberty nor safety."
--- Benjamin Franklin



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?a832538e0603281112g3d90c847h2810642d92a90c94>