From owner-freebsd-questions@FreeBSD.ORG Tue Jan 11 06:46:07 2005 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id C3D5316A505 for ; Tue, 11 Jan 2005 06:46:07 +0000 (GMT) Received: from rproxy.gmail.com (rproxy.gmail.com [64.233.170.200]) by mx1.FreeBSD.org (Postfix) with ESMTP id 37C6F43D4C for ; Tue, 11 Jan 2005 06:46:07 +0000 (GMT) (envelope-from artware@gmail.com) Received: by rproxy.gmail.com with SMTP id z35so92554rne for ; Mon, 10 Jan 2005 22:46:06 -0800 (PST) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:references; b=CtRdk7gu1+zEDKoUKs6CMGBbV47RVQY9nQKHlGd+BBq+xA0kAqWnV8Ckdgr/QJX9/b5SsXof8SPH6RzJ6gLZUq2m4lvnkfapYrPdLqUMjg0uOWUHWRPsImA/QRSnh/lyAblJvq1JjR1R7vNSvDGNU0Dgpw6LHgjRxvJJwGYA3oU= Received: by 10.38.208.59 with SMTP id f59mr35137rng; Mon, 10 Jan 2005 22:46:06 -0800 (PST) Received: by 10.38.65.13 with HTTP; Mon, 10 Jan 2005 22:46:06 -0800 (PST) Message-ID: Date: Tue, 11 Jan 2005 00:46:06 -0600 From: artware To: freebsd-questions@freebsd.org In-Reply-To: <41E318B2.3020108@makeworld.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit References: <20050110035717.27062.qmail@web41008.mail.yahoo.com> <41E318B2.3020108@makeworld.com> Subject: Re: Blacklisting IPs X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: artware List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 11 Jan 2005 06:46:07 -0000 Thanks for the input, everyone! Port-knocking is overkill at this point, but I did do the following things to sshd_config: Set port to non-default PermitRootLogin no LoginGraceTime 45s AllowUsers lists only one user -- me. :) I also did route -nq add -host xxx.xxx.xxx.xxx 127.0.0.1 -blackhole... I think telnet was disabled by default in the base 5.3 install... I know this attack was probably random, but the whole reason I took over as sysadmin and switched to FreeBSD is that our RHE box was being broken into almost nightly -- so I'm sensitive to security concerns. Is there anything else I should consider doing to the stock FreeBSD to fortify it? It already feels about 100 times more secure than RH... - ben