Date: Sun, 05 Oct 2008 19:27:03 -0400 From: Michael Voorhis <mvoorhis@cs.wpi.edu> To: Roman Kurakin <rik@inse.ru> Cc: freebsd-current@freebsd.org Subject: Re: SSH Brute Force attempts Message-ID: <48E94D47.4030106@cs.wpi.edu> In-Reply-To: <48E920FC.50005@localhost.inse.ru> References: <48E16E93.3090601@gmail.com> <48E4368E.4020404@gmail.com> <4046.82.41.242.250.1223173482.squirrel@mail.elegosoft.com> <20081005073409.62441itn43jvde80@econet.encontacto.net> <48E920FC.50005@localhost.inse.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
The "denyhosts" port has been very useful in defending against these incessant SSH attacks for us. The package watches syslog and locks out attackers based on a number of configurable parameters. http://denyhosts.sourceforge.net/ http://www.freshports.org/security/denyhosts/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?48E94D47.4030106>