Date: Wed, 28 Nov 2012 00:49:42 +0100 From: Frank Reppin <frank@undermydesk.org> To: Aleksandr Miroslav <alexmiroslav@gmail.com> Cc: freebsd-questions@freebsd.org Subject: Re: denyhosts, fail2ban, or something else? Message-ID: <50B55196.7090905@undermydesk.org> In-Reply-To: <CACcSE1w-iDyzfmAGSGYRA30VBy9DytQCsfKBHr=RGtdqovEvQg@mail.gmail.com> References: <CACcSE1w-iDyzfmAGSGYRA30VBy9DytQCsfKBHr=RGtdqovEvQg@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, On 27.11.2012 23:25, Aleksandr Miroslav wrote: [...] > Finally got sick of seeing tons of ssh break-in attempts in my logs. Am > considering using denyhosts, or fail2ban. Anyone have any experience > with these? > > I'm already using the AllowUsers facility of ssh to only allow specific > users in, so I'm not overly concerned about the attempts. Not sure if letting sshd listen on a different port is an option for your specific needs... but (at least in my experience) it significantly cuts down those log entries since probably most of these attempts are from bots anyways. HTH, Frank Reppin -- 43rd Law of Computing: Anything that can go wr fortune: Segmentation violation -- Core dumped
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?50B55196.7090905>