On Fri, 1 Feb 2008, Matt wrote:

> From: Matt <[EMAIL PROTECTED]>
> To: Chris <[EMAIL PROTECTED]>
> Cc: OpenBSD Misc <misc@openbsd.org>
> Date: Fri, 01 Feb 2008 09:25:02 +0100
> Subject: Re: avoid logging useless ssh brute force attempts
> 

...

> One of the suggestions I have seen on this list is to enable
> pf and add an max-src-connection rate for ssh.  So if someone
> connects, say 4 times within 30 seconds, you block them.  It will
> not stop the first attempts from being logged but after that you
> are in the clear.

As Peter has pointed out:

http://home.nuug.no/~peter/pf/en/bruteforce.html

is an excellent starting point for setting this up.  That's
where I started from.

> Make sure you empty the table with attackers once in a while though.

See:

/usr/ports/sysutils/expiretable

for an easy way to set this up, either as a daemon process or run out
of cron.
-- 
Dennis Davis, BUCS, University of Bath, Bath, BA2 7AY, UK
[EMAIL PROTECTED]               Phone: +44 1225 386101

Reply via email to