Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 5 Oct 2008 04:24:42 +0200 (CEST)
From:      sk@elegosoft.com
To:        "Eitan Adler" <eitanadlerlist@gmail.com>
Cc:        freebsd-current@freebsd.org
Subject:   Re: SSH Brute Force attempts
Message-ID:  <4046.82.41.242.250.1223173482.squirrel@mail.elegosoft.com>
In-Reply-To: <48E4368E.4020404@gmail.com>
References:  <48E16E93.3090601@gmail.com> <48E4368E.4020404@gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
mornin'

 Rich Healey wrote:
>> Recently I'm getting a lot of brute force attempts on my server, in the
>> past I've used various tips and tricks with linux boxes but many of them
>> were fairly linux specific.


disable pasword authentication OR use very strong passwords (24 chars)
OR use OTP

if it is applicable you could limit access by hosts (from=)

nothing of the above is linux or BSD specific

btw. Software to delay Login Attempts could be tricked.

> Personally I find that changing the port to anything other than 22 stops
> a lot of the skiddie brute force attacks.  Thats not to say you
> shouldn't use something else as well - but it is something.

it works for one of my servers too, but is security by obscurity

regards
Stefan





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4046.82.41.242.250.1223173482.squirrel>