Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 02 Oct 2005 16:32:39 -0600
From:      Brett Glass <brett@lariat.org>
To:        Daniel Gerzo <danger@rulez.sk>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Repeated attacks via SSH
Message-ID:  <6.2.3.4.2.20051002162545.08f66558@localhost>
In-Reply-To: <1048266117.20051003001242@rulez.sk>
References:  <6.2.3.4.2.20051002153930.07a50528@localhost> <1048266117.20051003001242@rulez.sk>

next in thread | previous in thread | raw e-mail | index | archive | help
At 04:12 PM 10/2/2005, Daniel Gerzo wrote:

>very nice is to use AllowUsers in form of user@host.

If you can get away with it, absolutely. Same with the RSA keys.
Of course, the problem is that if you need to get access in an
emergency from who-knows-where, you're pretty much stuck with
passwords unless you have a token system or a one time password
system (e.g. S/Key). (Which reminds me: Anyone have a good S/Key
implementation for the Palm Pilot?)

>> We also have a log monitor
>> that watches the logs (/var/log/auth.log in particular) and 
>> blackholes hosts that seem to be trying to break in via SSH.
>
>I wrote a similar script. it's also in ports under
>security/bruteforceblocker

The system we're using is the general purpose log monitor I
described at BSDCon in San Francisco. It's written in SNOBOL4
and has nice features like amnesty and rate limiting.

--Brett




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.2.3.4.2.20051002162545.08f66558>