Date: Wed, 28 Nov 2012 08:22:28 +0000 From: Arthur Chance <freebsd@qeng-ho.org> To: Aleksandr Miroslav <alexmiroslav@gmail.com> Cc: freebsd-questions@freebsd.org Subject: Re: denyhosts, fail2ban, or something else? Message-ID: <50B5C9C4.9060006@qeng-ho.org> In-Reply-To: <CACcSE1w-iDyzfmAGSGYRA30VBy9DytQCsfKBHr=RGtdqovEvQg@mail.gmail.com> References: <CACcSE1w-iDyzfmAGSGYRA30VBy9DytQCsfKBHr=RGtdqovEvQg@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 11/27/12 22:25, Aleksandr Miroslav wrote: > Finally got sick of seeing tons of ssh break-in attempts in my logs. Am > considering using denyhosts, or fail2ban. Anyone have any experience > with these? > > I'm already using the AllowUsers facility of ssh to only allow specific > users in, so I'm not overly concerned about the attempts. > > This is for a FreeBSD 8.x box running pf, btw. It's probably major overkill and may not fit your needs but this article by Colin Percival is an interesting enhancement to the non-standard port solution. http://www.daemonology.net/blog/2012-08-30-protecting-sshd-using-spiped.html
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?50B5C9C4.9060006>