Date: Mon, 21 Aug 2006 00:19:27 +0300 (EEST) From: Dmitry Pryanishnikov <dmitry@atlantis.dp.ua> To: Pieter de Boer <pieter@thedarkside.nl> Cc: freebsd-security@freebsd.org Subject: Re: SSH scans vs connection ratelimiting Message-ID: <20060821001221.T49962@atlantis.atlantis.dp.ua> In-Reply-To: <44E76B21.8000409@thedarkside.nl> References: <44E76B21.8000409@thedarkside.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
Hello! On Sat, 19 Aug 2006, Pieter de Boer wrote: > For months now, we're all seeing repeated bruteforce attempts on SSH. I've > configured my pf install to ratelimit TCP connections to port 22 and to I wonder why OpenSSH still doesn't support simple and nice feature of SSH.COM's sshd2_config: LoginGraceTime 60 AuthInteractiveFailureTimeout 10 These settings effectively cause robots to stop the scan for me. Every scan attempt gives only 1..N failed attempts (where N=number of externally-reachable and SSH-served IPs on machine if robot is capable of simultaneous scan of several IPs), so I can just ignore them. Sincerely, Dmitry -- Atlantis ISP, System Administrator e-mail: dmitry@atlantis.dp.ua nic-hdl: LYNX-RIPE
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060821001221.T49962>