artware wrote:

Hello again,

My 5.3R system has only been up a little over a week, and I've already
had a few breakin attempts -- they show up as Illegal user tests in
the /var/log/auth.log... It looks like they're trying common login
names (probably with the login name used as passwd). It takes them
hours to try a dozen names, but I'd rather not have any traffic from
these folks. Is there any way to blacklist IPs at the system level, or
do I have to hack something together for each daemon?

- ben



/etc/hosts.allow?

There were a lot of varying ideas in a thread titled "blacklisting failed
ssh attempts on this list about Dec. 1st --- perhaps you can gain some
wisdom there.

I don't know that it's much to worry about, just a bot looking
for lame passwords on Linux boxen.  There are a number of
possible responses, and the likelihood of a successful "attack"
via this mechanism seems slim....

Kevin Kinsey
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to