Date: Sun, 02 Oct 2005 16:32:39 -0600 From: Brett Glass <brett@lariat.org> To: Daniel Gerzo <danger@rulez.sk> Cc: freebsd-security@freebsd.org Subject: Re: Repeated attacks via SSH Message-ID: <6.2.3.4.2.20051002162545.08f66558@localhost> In-Reply-To: <1048266117.20051003001242@rulez.sk> References: <6.2.3.4.2.20051002153930.07a50528@localhost> <1048266117.20051003001242@rulez.sk>
next in thread | previous in thread | raw e-mail | index | archive | help
At 04:12 PM 10/2/2005, Daniel Gerzo wrote: >very nice is to use AllowUsers in form of user@host. If you can get away with it, absolutely. Same with the RSA keys. Of course, the problem is that if you need to get access in an emergency from who-knows-where, you're pretty much stuck with passwords unless you have a token system or a one time password system (e.g. S/Key). (Which reminds me: Anyone have a good S/Key implementation for the Palm Pilot?) >> We also have a log monitor >> that watches the logs (/var/log/auth.log in particular) and >> blackholes hosts that seem to be trying to break in via SSH. > >I wrote a similar script. it's also in ports under >security/bruteforceblocker The system we're using is the general purpose log monitor I described at BSDCon in San Francisco. It's written in SNOBOL4 and has nice features like amnesty and rate limiting. --Brett
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.2.3.4.2.20051002162545.08f66558>