Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 Nov 2012 08:22:28 +0000
From:      Arthur Chance <freebsd@qeng-ho.org>
To:        Aleksandr Miroslav <alexmiroslav@gmail.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: denyhosts, fail2ban, or something else?
Message-ID:  <50B5C9C4.9060006@qeng-ho.org>
In-Reply-To: <CACcSE1w-iDyzfmAGSGYRA30VBy9DytQCsfKBHr=RGtdqovEvQg@mail.gmail.com>
References:  <CACcSE1w-iDyzfmAGSGYRA30VBy9DytQCsfKBHr=RGtdqovEvQg@mail.gmail.com>

Next in thread | Previous in thread | Raw E-Mail | Index | Archive | Help
On 11/27/12 22:25, Aleksandr Miroslav wrote:
> Finally got sick of seeing tons of ssh break-in attempts in my logs. Am
> considering using denyhosts, or fail2ban. Anyone have any experience
> with these?
>
> I'm already using the AllowUsers facility of ssh to only allow specific
> users in, so I'm not overly concerned about the attempts.
>
> This is for a FreeBSD 8.x box running pf, btw.

It's probably major overkill and may not fit your needs but this article 
by Colin Percival is an interesting enhancement to the non-standard port 
solution.

http://www.daemonology.net/blog/2012-08-30-protecting-sshd-using-spiped.html





Want to link to this message? Use this URL: <http://docs.FreeBSD.org/cgi/mid.cgi?50B5C9C4.9060006>