Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 Jul 2005 20:43:08 -0400
From:      Chris Buechler <cbuechler@gmail.com>
To:        Chris Jones <cdjones@novusordo.net>
Cc:        freebsd-isp@freebsd.org, Todor Dragnev <todor.dragnev@gmail.com>
Subject:   Re: ssh brute force
Message-ID:  <d64aa176050720174322ebc621@mail.gmail.com>
In-Reply-To: <42DEAE1F.8000702@novusordo.net>
References:  <f72a639a050719121244719e22@mail.gmail.com> <42DEAE1F.8000702@novusordo.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On 7/20/05, Chris Jones <cdjones@novusordo.net> wrote:
>=20
> I'm looking at having a script look at SSH's log output for repeated
> failed connection attempts from the same address, and then blocking that
> address through pf (I'm not yet sure whether I want to do it temporarily
> or permanently).


Matt Dillon wrote an app in C to do just that, with ipfw. =20
http://leaf.dragonflybsd.org/mailarchive/users/2005-03/msg00008.html

Scott Ullrich modified it to work with pf. =20
http://pfsense.org/cgi-bin/cvsweb.cgi/tools/sshlockout_pf.c

-Chris



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?d64aa176050720174322ebc621>