From owner-freebsd-current@FreeBSD.ORG Sun Oct 5 02:56:46 2008 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 773881065686 for ; Sun, 5 Oct 2008 02:56:46 +0000 (UTC) (envelope-from sk@elegosoft.com) Received: from mx0.elegosoft.com (mx0.elegosoft.com [88.198.54.133]) by mx1.freebsd.org (Postfix) with ESMTP id 2D2E68FC13 for ; Sun, 5 Oct 2008 02:56:46 +0000 (UTC) (envelope-from sk@elegosoft.com) Received: from localhost (localhost [127.0.0.1]) by mx0.elegosoft.com (Postfix) with ESMTP id 92F7F1B48C6; Sun, 5 Oct 2008 04:24:52 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at mx0.elegosoft.com Received: from mx0.elegosoft.com ([127.0.0.1]) by localhost (mx0.elegosoft.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5BC5E2gwLYYQ; Sun, 5 Oct 2008 04:24:43 +0200 (CEST) Received: from mail.elegosoft.com (localhost [127.0.0.1]) by mx0.elegosoft.com (Postfix) with ESMTP id E465A1B48C4; Sun, 5 Oct 2008 04:24:42 +0200 (CEST) Received: from 82.41.242.250 (SquirrelMail authenticated user sk) by mail.elegosoft.com with HTTP; Sun, 5 Oct 2008 04:24:42 +0200 (CEST) Message-ID: <4046.82.41.242.250.1223173482.squirrel@mail.elegosoft.com> In-Reply-To: <48E4368E.4020404@gmail.com> References: <48E16E93.3090601@gmail.com> <48E4368E.4020404@gmail.com> Date: Sun, 5 Oct 2008 04:24:42 +0200 (CEST) From: sk@elegosoft.com To: "Eitan Adler" User-Agent: SquirrelMail/1.4.9a MIME-Version: 1.0 Content-Type: text/plain;charset=utf-8 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Mailman-Approved-At: Sun, 05 Oct 2008 04:57:34 +0000 Cc: freebsd-current@freebsd.org Subject: Re: SSH Brute Force attempts X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 05 Oct 2008 02:56:46 -0000 mornin' Rich Healey wrote: >> Recently I'm getting a lot of brute force attempts on my server, in the >> past I've used various tips and tricks with linux boxes but many of them >> were fairly linux specific. disable pasword authentication OR use very strong passwords (24 chars) OR use OTP if it is applicable you could limit access by hosts (from=) nothing of the above is linux or BSD specific btw. Software to delay Login Attempts could be tricked. > Personally I find that changing the port to anything other than 22 stops > a lot of the skiddie brute force attacks. Thats not to say you > shouldn't use something else as well - but it is something. it works for one of my servers too, but is security by obscurity regards Stefan