Date: Sat, 4 Jun 2005 13:14:28 -0500 From: "John Brooks" <john@day-light.com> To: "Brian Reichert" <reichert@numachi.com> Cc: freebsd-isp@freebsd.org Subject: RE: inbound ssh ceased on 4 servers at same time Message-ID: <NHBBKEEMKJDINKDJBJHGKEOMJAAD.john@day-light.com> In-Reply-To: <20050604174732.GG79969@numachi.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Thanks, sounds good to do on the outward facing firewall. These four freebsd boxes are protected behind an openbsd firewall so none of the brute-force sshd attacks have ever reached them. All four machines were updated (buildworld) exactly 30 days earlier, and all developed this behavior at the same time. Seems almost too much of a coincidence. I guess it's time to start checksuming binaries with boxes on other networks not exhibiting this problem. -- John Brooks john@day-light.com > -----Original Message----- > From: Brian Reichert [mailto:reichert@numachi.com] > Sent: Saturday, June 04, 2005 12:48 PM > To: John Brooks > Cc: freebsd-isp@freebsd.org > Subject: Re: inbound ssh ceased on 4 servers at same time > > > On Sat, Jun 04, 2005 at 12:10:28AM -0500, John Brooks wrote: > > today at about noon, all four freebsd servers on a clients lan > > quit accepting ssh connections. > > I've been seeing a lot of brute-force sshd attacks, which leave > a lot of connections in an awkward state. I've done this for my > primary sshd server, and seems to have alleviated my problems: > > LoginGraceTime 60 > MaxStartups 10:30:60 > > > -- > > John Brooks > > john@day-light.com > > -- > Brian Reichert <reichert@numachi.com> > 55 Crystal Ave. #286 Daytime number: (603) 434-6842 > Derry NH 03038-1725 USA BSD admin/developer > at large >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?NHBBKEEMKJDINKDJBJHGKEOMJAAD.john>