Date: Fri, 18 Jun 2010 11:55:14 -0400 From: Jason Dixon <jdixon@omniti.com> To: Glen Barber <glen.j.barber@gmail.com> Cc: Jerry Bell <jerry@nrdx.com>, freebsd-questions@freebsd.org, Kaya Saman <SamanKaya@netscape.net> Subject: Re: system is under attack (what can I do more?) Message-ID: <20100618155514.GI29381@omniti.com> In-Reply-To: <4C1B9549.4080801@gmail.com> References: <367428.93212.qm@web51108.mail.re2.yahoo.com> <4C1B67B2.8000309@nrdx.com> <4C1B90CE.4020509@netscape.net> <4C1B9549.4080801@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Jun 18, 2010 at 11:48:25AM -0400, Glen Barber wrote: > Hi, > > On 6/18/10 11:29 AM, Kaya Saman wrote: >> [...] >>> Look at ports/security/sshguard and ports/security/bruteblock. >>> >>> I use sshguard with ipfilter, but it works with pf and ipfw as well. >>> It is very simple to set up and gets the job done. >> >> Hi just wanted to say thanks for stating this as I'm also looking for a >> BSD version of fail2ban which I couldn't find in the FreeBSD ports >> collection...... > > security/py-fail2ban Doesn't FreeBSD's version of pf support the overload feature? This is how we typically manage ssh bruteforce attempts in OpenBSD/pf-land. -- Jason Dixon OmniTI Computer Consulting, Inc. jdixon@omniti.com 443.325.1357 x.241
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100618155514.GI29381>