From owner-freebsd-current@FreeBSD.ORG Sun Oct 5 23:54:09 2008 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id C4406106568B for ; Sun, 5 Oct 2008 23:54:09 +0000 (UTC) (envelope-from mvoorhis@cs.wpi.edu) Received: from mail1.wpi.edu (MAIL1.WPI.EDU [130.215.36.91]) by mx1.freebsd.org (Postfix) with ESMTP id 65D588FC15 for ; Sun, 5 Oct 2008 23:54:09 +0000 (UTC) (envelope-from mvoorhis@cs.wpi.edu) Received: from SMTP.WPI.EDU (SMTP.WPI.EDU [130.215.36.186]) by mail1.wpi.edu (8.14.3/8.14.3) with ESMTP id m95NR5BY030178; Sun, 5 Oct 2008 19:27:05 -0400 Received: from APPLIANCE4.WPI.EDU (appliance4.wpi.edu [130.215.36.61]) by SMTP.WPI.EDU (8.13.8/8.13.8) with ESMTP id m95NR4Zr010154; Sun, 5 Oct 2008 19:27:04 -0400 (envelope-from mvoorhis@cs.wpi.edu) Received: from [192.168.0.101] ([97.95.178.67]) (authenticated authen=mvoorhis) by APPLIANCE4.WPI.EDU (8.14.3/8.14.3) with ESMTP id m95NR4rf016792 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 5 Oct 2008 19:27:04 -0400 Message-ID: <48E94D47.4030106@cs.wpi.edu> Date: Sun, 05 Oct 2008 19:27:03 -0400 From: Michael Voorhis User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: Roman Kurakin References: <48E16E93.3090601@gmail.com> <48E4368E.4020404@gmail.com> <4046.82.41.242.250.1223173482.squirrel@mail.elegosoft.com> <20081005073409.62441itn43jvde80@econet.encontacto.net> <48E920FC.50005@localhost.inse.ru> In-Reply-To: <48E920FC.50005@localhost.inse.ru> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-current@freebsd.org Subject: Re: SSH Brute Force attempts X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 05 Oct 2008 23:54:09 -0000 The "denyhosts" port has been very useful in defending against these incessant SSH attacks for us. The package watches syslog and locks out attackers based on a number of configurable parameters. http://denyhosts.sourceforge.net/ http://www.freshports.org/security/denyhosts/