Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 18 Jun 2010 18:29:18 +0300
From:      Kaya Saman <SamanKaya@netscape.net>
To:        Jerry Bell <jerry@nrdx.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: system is under attack (what can I do more?)
Message-ID:  <4C1B90CE.4020509@netscape.net>
In-Reply-To: <4C1B67B2.8000309@nrdx.com>
References:  <367428.93212.qm@web51108.mail.re2.yahoo.com> <4C1B67B2.8000309@nrdx.com>

next in thread | previous in thread | raw e-mail | index | archive | help
[...]
> Look at ports/security/sshguard and ports/security/bruteblock.
>
> I use sshguard with ipfilter, but it works with pf and ipfw as well.  
> It is very simple to set up and gets the job done.
>
> Jerry
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to 
> "freebsd-questions-unsubscribe@freebsd.org"

Hi just wanted to say thanks for stating this as I'm also looking for a 
BSD version of fail2ban which I couldn't find in the FreeBSD ports 
collection......

A real problem with this kind of attack is that even though brute force 
in nature it can also work like a DoS if the server is having to handle 
X amount of break-ins per second and also if multiple people are trying 
to hack the system at the same time, it can steal bandwidth too as let's 
face it not everyone has high powered enterprise grade MetroEthernet or 
OC12+ Trunks WAN connectivity. A lot of people are still on ADSL or even 
Dial-Up.

Regards,

Kaya



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4C1B90CE.4020509>