Date: Fri, 18 Jun 2010 18:29:18 +0300 From: Kaya Saman <SamanKaya@netscape.net> To: Jerry Bell <jerry@nrdx.com> Cc: freebsd-questions@freebsd.org Subject: Re: system is under attack (what can I do more?) Message-ID: <4C1B90CE.4020509@netscape.net> In-Reply-To: <4C1B67B2.8000309@nrdx.com> References: <367428.93212.qm@web51108.mail.re2.yahoo.com> <4C1B67B2.8000309@nrdx.com>
next in thread | previous in thread | raw e-mail | index | archive | help
[...] > Look at ports/security/sshguard and ports/security/bruteblock. > > I use sshguard with ipfilter, but it works with pf and ipfw as well. > It is very simple to set up and gets the job done. > > Jerry > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to > "freebsd-questions-unsubscribe@freebsd.org" Hi just wanted to say thanks for stating this as I'm also looking for a BSD version of fail2ban which I couldn't find in the FreeBSD ports collection...... A real problem with this kind of attack is that even though brute force in nature it can also work like a DoS if the server is having to handle X amount of break-ins per second and also if multiple people are trying to hack the system at the same time, it can steal bandwidth too as let's face it not everyone has high powered enterprise grade MetroEthernet or OC12+ Trunks WAN connectivity. A lot of people are still on ADSL or even Dial-Up. Regards, Kaya
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4C1B90CE.4020509>