From owner-freebsd-questions@FreeBSD.ORG Tue Mar 15 05:28:08 2005 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 658B116A4CE for ; Tue, 15 Mar 2005 05:28:08 +0000 (GMT) Received: from sccmmhc91.asp.att.net (sccmmhc91.asp.att.net [204.127.203.211]) by mx1.FreeBSD.org (Postfix) with ESMTP id E4AA143D2F for ; Tue, 15 Mar 2005 05:28:07 +0000 (GMT) (envelope-from josh@tcbug.org) Received: from [10.0.0.10] (12-218-21-193.client.mchsi.com[12.218.21.193]) by sccmmhc91.asp.att.net (sccmmhc91) with ESMTP id <20050315052805m9100r849me>; Tue, 15 Mar 2005 05:28:05 +0000 From: Josh Paetzel To: freebsd-questions@freebsd.org, Kyle Jensen Date: Mon, 14 Mar 2005 23:28:03 -0600 User-Agent: KMail/1.7 References: In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200503142328.04036.josh@tcbug.org> Subject: Re: Cutting down on ssh breakin attempts X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 Mar 2005 05:28:08 -0000 On Monday 14 March 2005 07:04, Kyle Jensen wrote: > Hi, > > I run a webmail server for a small company, which > is (of course) running FreeBSD 5-stable. I get about > 50-100 failed loging attempts via ssh on a daily basis. > > Occasionally, these show up in my daily security digest > with messages like: > > reverse mapping checking getaddrinfo for h169-210-68-8.a > dcast.com.tw failed - POSSIBLE BREAKIN ATTEMPT! > > But mostly it's stuff like > > Illegal user postgres from 210.68.8.169 > > What's the best way to cut down on these attempts? > I thought about adding a blacklist to my pf.conf rules > for the pf firewall. > > Any thoughts would be greatly appreciated! > Kyle Maybe this is an obvious question, but do you need world access to ssh? -- Thanks, Josh Paetzel