Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 May 2006 16:17:45 -0700
From:      "Kian Mohageri" <kian.mohageri@gmail.com>
To:        "Viktor Vasilev" <viktor.vasilev@stud.tu-darmstadt.de>
Cc:        freebsd-pf@freebsd.org
Subject:   Re: promt solution with max-src-conn-rate
Message-ID:  <fee88ee40605151617x75001284x54b9f33f89b7c339@mail.gmail.com>
In-Reply-To: <200605151823.17265.viktor.vasilev@stud.tu-darmstadt.de>
References:  <44680266.2090007@azimut-tour.ru> <446873D3.7090703@azimut-tour.ru> <55e8a96c0605150907k49af4454t5d0431ea036e11bc@mail.gmail.com> <200605151823.17265.viktor.vasilev@stud.tu-darmstadt.de>

next in thread | previous in thread | raw e-mail | index | archive | help
>
> There is a nice and easy way to blocking ssh brute-force attempts with pf
> only:
>
>   http://legonet.org/~griffin/openbsd/block_ssh_bruteforce.html



Exactly.  This is a much cleaner solution than portknocking to stop brute
force attacks.  I recently implemented this on a few of my servers.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?fee88ee40605151617x75001284x54b9f33f89b7c339>