From owner-freebsd-questions@FreeBSD.ORG Mon Apr 16 00:24:13 2007 Return-Path: X-Original-To: questions@freebsd.org Delivered-To: freebsd-questions@FreeBSD.ORG Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 095E516A403 for ; Mon, 16 Apr 2007 00:24:13 +0000 (UTC) (envelope-from wmoran@potentialtech.com) Received: from mail.potentialtech.com (internet.potentialtech.com [66.167.251.6]) by mx1.freebsd.org (Postfix) with ESMTP id D049213C44B for ; Mon, 16 Apr 2007 00:24:12 +0000 (UTC) (envelope-from wmoran@potentialtech.com) Received: from working (c-71-60-105-193.hsd1.pa.comcast.net [71.60.105.193]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.potentialtech.com (Postfix) with ESMTP id 40760EBC78; Sun, 15 Apr 2007 20:24:12 -0400 (EDT) Date: Sun, 15 Apr 2007 20:24:11 -0400 From: Bill Moran To: "Juha Saarinen" Message-Id: <20070415202411.4264fe5d.wmoran@potentialtech.com> In-Reply-To: References: <20070415200255.18e6ab3f.wmoran@potentialtech.com> X-Mailer: Sylpheed version 2.2.10 (GTK+ 2.10.9; i386-portbld-freebsd6.2) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: questions@freebsd.org Subject: Re: Defending against SSH attacks with pf X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Apr 2007 00:24:13 -0000 "Juha Saarinen" wrote: > > On 4/16/07, Bill Moran wrote: > > > > There was some discussion on this list not too long ago, and someone > > asked if I was willing to make my pf config and the associated scripts > > I wrote for it public. I would have posted on the original thread, > > but I can't find it now. > > > > Here is the information: > > http://www.potentialtech.com/cms/node/16 > > Useful, but the bots have started to use longer intervals between > connection attempts now. The intervals are not yet randomised though. > > $ sudo pfctl -t sshbrute -T show | wc > 234 234 4023 > > Ugh. That's in just under two months. If you read the whole thing, you'll see that I don't rely on the throttling alone. I have a script that adds IPs when invalid user names are attempted. I'm considering writing more, but just haven't gotten to it yet. -- Bill Moran http://www.potentialtech.com