Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 13 Nov 2004 07:55:34 -0600
From:      "Kevin D. Kinsey, DaleCo, S.P." <kdk@daleco.biz>
To:        dave <dmehler26@woh.rr.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: limiting ssh logins
Message-ID:  <41961256.5050309@daleco.biz>
In-Reply-To: <000501c4c934$21a46200$0200a8c0@satellite>
References:  <000501c4c934$21a46200$0200a8c0@satellite>

index | next in thread | previous in thread | raw e-mail

dave wrote:

>Hello,
>    I'm wondering if it's possible to use pam or perhaps tcp_wrappers to
>limit how many ssh logins can be atempted? I'd like to kick off a user who
>tries to log in repeatedly with the wrong password or tries x times within a
>minute, my purpose is to slow down hacking atempts in situations where
>public key authentication is not possible.
>Thanks.
>Dave.
>
>  
>


# man login.conf     | grep -A 5 -B 5 retries

     login_prompt     string              The login prompt given by login(1)
     login-backoff    number    3         The number of login attempts 
allowed
                                          before the backoff delay is 
inserted
                                          after each subsequent attempt.
     login-retries    number    10        The number of login attempts 
allowed
                                          before the login fails.
     passwd_format    string    md5       The encryption format that new or
                                          changed passwords will use.  Valid
                                          values include "des", "md5" and
                                          "blf".  NIS clients using a


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?41961256.5050309>