Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 29 Nov 2012 10:25:31 +0100
From:      Damien Fleuriot <ml@my.gd>
To:        Aleksandr Miroslav <alexmiroslav@gmail.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: denyhosts, fail2ban, or something else?
Message-ID:  <CAE63ME5Z_K2ytXYm1hVnoYhO_bfNUS6H9rixKgQrPf_icY5yvw@mail.gmail.com>
In-Reply-To: <CACcSE1w-iDyzfmAGSGYRA30VBy9DytQCsfKBHr=RGtdqovEvQg@mail.gmail.com>
References:  <CACcSE1w-iDyzfmAGSGYRA30VBy9DytQCsfKBHr=RGtdqovEvQg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 27 November 2012 23:25, Aleksandr Miroslav <alexmiroslav@gmail.com> wrote:
> Finally got sick of seeing tons of ssh break-in attempts in my logs. Am
> considering using denyhosts, or fail2ban. Anyone have any experience
> with these?
>
> I'm already using the AllowUsers facility of ssh to only allow specific
> users in, so I'm not overly concerned about the attempts.
>
> This is for a FreeBSD 8.x box running pf, btw.
>


Since nobody has mentioned it, I'll point you to sshguard.

It integrates with PF or IPFW and does the job.

As for AllowUsers, that's a good thing, I'm going that as well.
Some might argue that it's overkill, well let me tell you, virtually
nothing is overkill when it aims at preventing unauthorized SSH access
to your box.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAE63ME5Z_K2ytXYm1hVnoYhO_bfNUS6H9rixKgQrPf_icY5yvw>