From owner-freebsd-questions@FreeBSD.ORG Sat Mar 18 22:38:00 2006 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 759CD16A420 for ; Sat, 18 Mar 2006 22:38:00 +0000 (UTC) (envelope-from ciscoaix@yahoo.com) Received: from web52703.mail.yahoo.com (web52703.mail.yahoo.com [206.190.48.226]) by mx1.FreeBSD.org (Postfix) with SMTP id DD07643D46 for ; Sat, 18 Mar 2006 22:37:59 +0000 (GMT) (envelope-from ciscoaix@yahoo.com) Received: (qmail 20677 invoked by uid 60001); 18 Mar 2006 22:37:48 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=y/fHPHSqZG9pYQk4KqZhJpGSokqvLBXP0PuLTfEaIf3E/vRNl2hM9AfqpWqBqWGhwZaGyWHuynBw+0vle5f7DEQnEWNHeT4d+zG16plz21dMsdaKzLb5dQal9foohOUWbkPNXsWjhschhLPtHHM29LA/e12ZbaeI1Hh8wGLqmI8= ; Message-ID: <20060318223748.20675.qmail@web52703.mail.yahoo.com> Received: from [71.193.133.190] by web52703.mail.yahoo.com via HTTP; Sat, 18 Mar 2006 14:37:48 PST Date: Sat, 18 Mar 2006 14:37:48 -0800 (PST) From: Kris Anderson To: Chris Maness , freebsd-questions@freebsd.org In-Reply-To: <441C45BA.1030106@chrismaness.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8bit Cc: Subject: Re: How to Stop Bruit Force ssh Attempts? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 18 Mar 2006 22:38:00 -0000 --- Chris Maness wrote: > In my auth log I see alot of bruit force attempts to > login via ssh. Is > there a way I can have the box automatically kill > any tcp/ip > connectivity to hosts that try and fail a given > number of times? Is > there a port or something that I can install to give > this kind of > protection. I'm still kind of a FreeBSD newbie. > > Thanks, > Chris Maness Hey there, A couple of things you could try. I believe there is a port that watches log files, utilizing that you could create a script to add the IP to your firewall rules then after a time remove it. The other way is to use snort_inline and see how that works. Hope that helps. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com