Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 Sep 2006 09:28:53 -0500
From:      Eric <heli@mikestammer.com>
To:        questions@freebsd.org
Subject:   Re: sshd brute force attempts?
Message-ID:  <45115025.5010803@mikestammer.com>
In-Reply-To: <4511483C.6080607@reyrey.net>
References:  <20060919165400.A4380@prime.gushi.org>	<70e8236f0609191412p5779d94cqa16df5631f4de916@mail.gmail.com> <4511483C.6080607@reyrey.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Elijah Savage wrote:
> Joao Barros wrote:
>> On 9/19/06, Dan Mahoney, System Admin <danm@prime.gushi.org> wrote:
>>> Hey all,
>>>
>>> I've looked around and found several linux-centric things designed to
>>> block brute-force SSH attempts.  Anyone out there know of something a
>>> bit
>>> more BSD savvy?
>>
> I use /usr/ports/security/denyhost
> 
> It was very easy to install and setup the config file is commented so
> well and has so many different parameters. I get reports like this
> anytime my thresholds are crossed.
> 
> Added the following hosts to /etc/hosts.deniedssh:
> 
> 124.107.6.37 (124.107.6.37.pldt.net)

another vote for denyhost. it works well and stops the attacks. Even tho
i use keys and not passwords, i still use it.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?45115025.5010803>