Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 3 Oct 2005 01:47:54 +0100
From:      Subhi S Hashwa <lists@subhi.com>
To:        Don Lewis <truckman@FreeBSD.org>
Cc:        freebsd-security@FreeBSD.org
Subject:   Re[2]: Repeated attacks via SSH
Message-ID:  <1323455932.20051003014754@subhi.com>
In-Reply-To: <200510022208.j92M8joS016722@gw.catspoiler.org>
References:  <6.2.3.4.2.20051002153930.07a50528@localhost> <200510022208.j92M8joS016722@gw.catspoiler.org>

next in thread | previous in thread | raw e-mail | index | archive | help

Sunday, October 2, 2005, 11:08:45 PM, Don Lewis wrote:

> It's also a good idea to only allow public key authentication from
> remote hosts.  This avoids the risks of password guessing and password
> capture by shoulder surfers or key loggers.

I came across this package in ports, which could be useful in this
type of situation

/usr/ports/security/bruteforceblocker

BruteForceBlocker is a script, that works along with pf - OpenBSD's firewall.
When this script is running, it checks sshd's auth log for Failed Password
attempts and counts it's number. When given IP reaches specified number of
fails, script adds this IP to the pf's table and block any other traffic to
the given box. If you are bored of those automated auth tries, you will be
happy with this script.

WWW: http://danger.rulez.sk/projects/bruteforceblocker/


-- 
Best regards,
 Subhi S Hashwa                          mailto:lists@subhi.com
 When everything is heading your way, you're in the wrong lane.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1323455932.20051003014754>