Date: Sun, 15 Apr 2007 20:24:11 -0400 From: Bill Moran <wmoran@potentialtech.com> To: "Juha Saarinen" <juhasaarinen@gmail.com> Cc: questions@freebsd.org Subject: Re: Defending against SSH attacks with pf Message-ID: <20070415202411.4264fe5d.wmoran@potentialtech.com> In-Reply-To: <b34be8420704151719o4658bbn1b16afb939f3ac79@mail.gmail.com> References: <20070415200255.18e6ab3f.wmoran@potentialtech.com> <b34be8420704151719o4658bbn1b16afb939f3ac79@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
"Juha Saarinen" <juhasaarinen@gmail.com> wrote: > > On 4/16/07, Bill Moran <wmoran@potentialtech.com> wrote: > > > > There was some discussion on this list not too long ago, and someone > > asked if I was willing to make my pf config and the associated scripts > > I wrote for it public. I would have posted on the original thread, > > but I can't find it now. > > > > Here is the information: > > http://www.potentialtech.com/cms/node/16 > > Useful, but the bots have started to use longer intervals between > connection attempts now. The intervals are not yet randomised though. > > $ sudo pfctl -t sshbrute -T show | wc > 234 234 4023 > > Ugh. That's in just under two months. If you read the whole thing, you'll see that I don't rely on the throttling alone. I have a script that adds IPs when invalid user names are attempted. I'm considering writing more, but just haven't gotten to it yet. -- Bill Moran http://www.potentialtech.com
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070415202411.4264fe5d.wmoran>