Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 21 Aug 2006 00:19:27 +0300 (EEST)
From:      Dmitry Pryanishnikov <dmitry@atlantis.dp.ua>
To:        Pieter de Boer <pieter@thedarkside.nl>
Cc:        freebsd-security@freebsd.org
Subject:   Re: SSH scans vs connection ratelimiting
Message-ID:  <20060821001221.T49962@atlantis.atlantis.dp.ua>
In-Reply-To: <44E76B21.8000409@thedarkside.nl>
References:  <44E76B21.8000409@thedarkside.nl>

next in thread | previous in thread | raw e-mail | index | archive | help

Hello!

On Sat, 19 Aug 2006, Pieter de Boer wrote:
> For months now, we're all seeing repeated bruteforce attempts on SSH. I've 
> configured my pf install to ratelimit TCP connections to port 22 and to

  I wonder why OpenSSH still doesn't support simple and nice feature of 
SSH.COM's sshd2_config:

         LoginGraceTime                  60
         AuthInteractiveFailureTimeout   10

These settings effectively cause robots to stop the scan for me. Every
scan attempt gives only 1..N failed attempts (where N=number of 
externally-reachable and SSH-served IPs on machine if robot is capable of 
simultaneous scan of several IPs), so I can just ignore them.

Sincerely, Dmitry
-- 
Atlantis ISP, System Administrator
e-mail:  dmitry@atlantis.dp.ua
nic-hdl: LYNX-RIPE



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060821001221.T49962>