Anton Shterenlikht wrote:
I'm thinking of denying ssh access to host from which
I get brute force ssh attacks.

This is a returning topic, search the archives. Anyway, the returning answer:

- why not let your firewall do the blocking? If your blocking is IP based that's the place to block.

- why do you default to allow? How about default block, and then add the few good networks you know that actually need access? Restricting access to your own continent is a good start. I made this tool to create lists of ip ranges for individual countries:

  http://www.locolomo.org/pub/src/toolbox/inet.pl

if you're in US then it may not work since some US companies have ranges delegated directly by IANA rather than ARIN, but these are few so it's easy to add ranges manually, check the list here:

http://www.iana.net/assignments/ipv4-address-space/ipv4-address-space.xml

- why allow password based authentication? disable password based authentication and rely on keys, then you can ignore all the brute force attempts.

- above not a solution? See if you can tweak the sshd_config:

    MaxAuthTries
    MaxStartups

can slow down brute force attacks preventing it from sucking up resources.

Disable root login, restrict login to real users, if you have a group "users" just restrict to that using AllowGroups.

- trying to block individual offending hosts is futile, the attacker will usually try maybe a 1000 times, but the next one will likely come from a different address.

BR, Erik

--
Erik Nørgaard
Ph: +34.666334818/+34.915211157                  http://www.locolomo.org
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"

Reply via email to