Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 05 Oct 2008 19:27:03 -0400
From:      Michael Voorhis <mvoorhis@cs.wpi.edu>
To:        Roman Kurakin <rik@inse.ru>
Cc:        freebsd-current@freebsd.org
Subject:   Re: SSH Brute Force attempts
Message-ID:  <48E94D47.4030106@cs.wpi.edu>
In-Reply-To: <48E920FC.50005@localhost.inse.ru>
References:  <48E16E93.3090601@gmail.com>	<48E4368E.4020404@gmail.com>	<4046.82.41.242.250.1223173482.squirrel@mail.elegosoft.com>	<20081005073409.62441itn43jvde80@econet.encontacto.net> <48E920FC.50005@localhost.inse.ru>

next in thread | previous in thread | raw e-mail | index | archive | help
The "denyhosts" port has been very useful in defending against these 
incessant SSH attacks for us.  The package watches syslog and locks out 
attackers based on a number of configurable parameters.

http://denyhosts.sourceforge.net/
http://www.freshports.org/security/denyhosts/





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?48E94D47.4030106>