"Bharj, Gagan" <[EMAIL PROTECTED]> writes:

> Our server is getting hammered on a daily basis by IPs trying to open an ssh
> session.  Currently, I'm manually putting the subnets (in a pf table) that are
> repeatedly trying to get in.  As you can see, this list will eventually get
> very big and will be unmaintainable.  Is there any way that I can say only
> allow IP addresses from particular ISPs or domains?

You are really asking quite a few questions at the same time here.

Yes, it's possible to write your ssh pass rule to allow only $goodguys
(or <goodguys> for that matter) to pass. 

it is also possible to use max-src-conn, overload and friends to
silence bruteforcers, and it is possible to use something like
expiretable to weed out old entries in a table.  My PF tutorial has
examples at http://www.bgnett.no/~peter/pf/en/bruteforce.html

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
"First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales"
20:11:56 delilah spamd[26905]: 146.151.48.74: disconnected after 36099 seconds

Reply via email to