Date: Mon, 21 Aug 2006 00:19:27 +0300 (EEST) From: Dmitry Pryanishnikov <dmitry@atlantis.dp.ua> To: Pieter de Boer <pieter@thedarkside.nl> Cc: freebsd-security@freebsd.org Subject: Re: SSH scans vs connection ratelimiting Message-ID: <20060821001221.T49962@atlantis.atlantis.dp.ua> In-Reply-To: <44E76B21.8000409@thedarkside.nl> References: <44E76B21.8000409@thedarkside.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
Hello!
On Sat, 19 Aug 2006, Pieter de Boer wrote:
> For months now, we're all seeing repeated bruteforce attempts on SSH. I've
> configured my pf install to ratelimit TCP connections to port 22 and to
I wonder why OpenSSH still doesn't support simple and nice feature of
SSH.COM's sshd2_config:
LoginGraceTime 60
AuthInteractiveFailureTimeout 10
These settings effectively cause robots to stop the scan for me. Every
scan attempt gives only 1..N failed attempts (where N=number of
externally-reachable and SSH-served IPs on machine if robot is capable of
simultaneous scan of several IPs), so I can just ignore them.
Sincerely, Dmitry
--
Atlantis ISP, System Administrator
e-mail: dmitry@atlantis.dp.ua
nic-hdl: LYNX-RIPE
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060821001221.T49962>
