Date: Sat, 18 Mar 2006 12:35:28 -0800 From: Chris Maness <chris@chrismaness.com> To: Wes Santee <wsantee@gmail.com> Cc: freebsd-questions@freebsd.org Subject: Re: How to Stop Bruit Force ssh Attempts? Message-ID: <441C6F10.9020403@chrismaness.com> In-Reply-To: <441C4ABC.2090102@gmail.com> References: <441C45BA.1030106@chrismaness.com> <441C4ABC.2090102@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Wes Santee wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > Chris Maness wrote: > >> In my auth log I see alot of bruit force attempts to login via ssh. Is >> there a way I can have the box automatically kill any tcp/ip >> connectivity to hosts that try and fail a given number of times? Is >> there a port or something that I can install to give this kind of >> protection. I'm still kind of a FreeBSD newbie. >> > > security/bruteforeceblocker (requires pf as the firewall) > > security/denyhosts (uses tcp_wrappers and /etc/hosts.allow) > > security/sshit (requires ipfw as firewall) > > I rolled my own solution and haven't used any of these, so I don't know > how well they work in practice. They probably all require some initial > setup and configuration. > > Cheers, > - -Wes > > Thanks, I played with all three. Denyhosts is the best hands down.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?441C6F10.9020403>