Date: Tue, 02 Jan 2007 08:34:31 -0600 From: Eric <heli@mikestammer.com> To: Len Conrad <LConrad@Go2France.com> Cc: freebsd-questions@freebsd.org Subject: Re: sshd break-in attempt Message-ID: <459A6D77.5010003@mikestammer.com> In-Reply-To: <200701021505921.SM00292@TX2.Go2France.com> References: <459A5A45.4080309@wmptl.com> <200701021505921.SM00292@TX2.Go2France.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Len Conrad wrote: > >> >> In our 'periodic daily' report/email, (only the list goes on for >> hundreds of attempts). Anyhow, long story short; is there not an easy >> way to make sshd block or deny hosts temporarily if X number of >> invalid login attempts are made within a minute's time? > > to reduce the brute force attacks + voluminous logging, tell sshd to > listen on port other than 22. > > google for "tcp wrappers sshd" for examples of how to use tcp wrappers > in reactive blocking > > Len > > > check out the denyhosts port as well. works great
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?459A6D77.5010003>