Date: Mon, 15 May 2006 16:17:45 -0700 From: "Kian Mohageri" <kian.mohageri@gmail.com> To: "Viktor Vasilev" <viktor.vasilev@stud.tu-darmstadt.de> Cc: freebsd-pf@freebsd.org Subject: Re: promt solution with max-src-conn-rate Message-ID: <fee88ee40605151617x75001284x54b9f33f89b7c339@mail.gmail.com> In-Reply-To: <200605151823.17265.viktor.vasilev@stud.tu-darmstadt.de> References: <44680266.2090007@azimut-tour.ru> <446873D3.7090703@azimut-tour.ru> <55e8a96c0605150907k49af4454t5d0431ea036e11bc@mail.gmail.com> <200605151823.17265.viktor.vasilev@stud.tu-darmstadt.de>
next in thread | previous in thread | raw e-mail | index | archive | help
> > There is a nice and easy way to blocking ssh brute-force attempts with pf > only: > > http://legonet.org/~griffin/openbsd/block_ssh_bruteforce.html Exactly. This is a much cleaner solution than portknocking to stop brute force attacks. I recently implemented this on a few of my servers.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?fee88ee40605151617x75001284x54b9f33f89b7c339>