From owner-freebsd-questions@FreeBSD.ORG Tue Jan 9 09:42:32 2007 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 14C5116A40F for ; Tue, 9 Jan 2007 09:42:32 +0000 (UTC) (envelope-from eayesta@portugalete.uned.es) Received: from hermes-tres.uned.es (hermes-tres.uned.es [62.204.192.103]) by mx1.freebsd.org (Postfix) with ESMTP id C2EA013C455 for ; Tue, 9 Jan 2007 09:42:31 +0000 (UTC) (envelope-from eayesta@portugalete.uned.es) Received: from hermes-tres.uned.es (localhost.localdomain [127.0.0.1]) by localhost.uned.es (Postfix) with ESMTP id D55C098224; Tue, 9 Jan 2007 10:16:22 +0100 (CET) Received: from stargate-2.unedbizkaia.es (ca6200-010-200-062-202.uned.es [10.200.62.202]) by hermes-tres.uned.es (Postfix) with ESMTP id B54449821E; Tue, 9 Jan 2007 10:16:22 +0100 (CET) From: Enrique Ayesta Perojo To: freebsd-questions@freebsd.org Date: Tue, 9 Jan 2007 10:16:27 +0100 User-Agent: KMail/1.9.4 References: <459A5A45.4080309@wmptl.com> In-Reply-To: <459A5A45.4080309@wmptl.com> X-Face: 1Ap'j*2\*m:5K9|Z3(3hw}>e7y}bKl>WsTt:A%1stWDEm9`D?s("Bk-4(uS((PR|BJ|^+)=?utf-8?q?=0A=099rL=26=251*N1v57h=5E+/7=2E=5E?=<|jyu`lrfTXqiA5.*wrD0kx@J\Qbd[Ik3GF+av(g. MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline Message-Id: <200701091016.27589.eayesta@portugalete.uned.es> Cc: Nathan Vidican Subject: Re: sshd break-in attempt X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 09 Jan 2007 09:42:32 -0000 El Martes, 2 de Enero de 2007 14:12, Nathan Vidican escribi=F3: > In our 'periodic daily' report/email, (only the list goes on for hundreds > of attempts). Anyhow, long story short; is there not an easy way to make > sshd block or deny hosts temporarily if X number of invalid login attempts > are made within a minute's time? Must I use an external wrapper to > accomplish this, or can it be done with options to sshd on it's own? I'm using security/bruteforceblocker with success, it's easy to install and= =20 run and works with pf