Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 18 Jun 2010 11:55:14 -0400
From:      Jason Dixon <jdixon@omniti.com>
To:        Glen Barber <glen.j.barber@gmail.com>
Cc:        Jerry Bell <jerry@nrdx.com>, freebsd-questions@freebsd.org, Kaya Saman <SamanKaya@netscape.net>
Subject:   Re: system is under attack (what can I do more?)
Message-ID:  <20100618155514.GI29381@omniti.com>
In-Reply-To: <4C1B9549.4080801@gmail.com>
References:  <367428.93212.qm@web51108.mail.re2.yahoo.com> <4C1B67B2.8000309@nrdx.com> <4C1B90CE.4020509@netscape.net> <4C1B9549.4080801@gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Jun 18, 2010 at 11:48:25AM -0400, Glen Barber wrote:
> Hi,
>
> On 6/18/10 11:29 AM, Kaya Saman wrote:
>> [...]
>>> Look at ports/security/sshguard and ports/security/bruteblock.
>>>
>>> I use sshguard with ipfilter, but it works with pf and ipfw as well.
>>> It is very simple to set up and gets the job done.
>>
>> Hi just wanted to say thanks for stating this as I'm also looking for a
>> BSD version of fail2ban which I couldn't find in the FreeBSD ports
>> collection......
>
> security/py-fail2ban

Doesn't FreeBSD's version of pf support the overload feature?  This is
how we typically manage ssh bruteforce attempts in OpenBSD/pf-land.

-- 
Jason Dixon
OmniTI Computer Consulting, Inc.
jdixon@omniti.com
443.325.1357 x.241



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100618155514.GI29381>