Re: Security blocking question

2009-10-16 Thread Matthew Seaman
Aflatoon Aflatooni wrote: I have the following in my pf.conf: ext_if="bge0" # Public Services -- smtp, http, pop3s tcpPubServices = "{ 25, 80, 995 }" set timeout { interval 10, frag 30 } set timeout { tcp.first 120, tcp.opening 30, tcp.established 86400 } set timeout { tcp.closing 900, tcp.fin

Re: Security blocking question

2009-10-16 Thread Aflatoon Aflatooni
> Aflatoon Aflatooni wrote: > >>> Is there a way that I could configure the server so that if there are for > >> example X attempts from an IP address then for the next Y hours all the > >> SSH > requests would be ignored from that IP address? There are only a handful of > people who have acces

Re: Security blocking question

2009-10-16 Thread Matthew Seaman
Aflatoon Aflatooni wrote: Is there a way that I could configure the server so that if there are for example X attempts from an IP address then for the next Y hours all the SSH requests would be ignored from that IP address? There are only a handful of people who have access to that server. Ye

Re: Security blocking question

2009-10-15 Thread Aflatoon Aflatooni
> > > > Is there a way that I could configure the server so that if there are for > example X attempts from an IP address then for the next Y hours all the SSH > requests would be ignored from that IP address? There are only a handful of > people who have access to that server. > > Yes. > > I

Re: Security blocking question

2009-10-10 Thread Matthew Seaman
Svante Kvarnstrom wrote: On Oct 9, 2009, at 11:56 PM, Matthew Seaman wrote: plus you'll need to add a cron job to clear old entries out of the ssh-bruteforce table after a suitable amount of time has passed. Use expiretable to do that. I believe that security/expiretable is superfluous now

Re: Security blocking question

2009-10-09 Thread Svante Kvarnstrom
On Oct 9, 2009, at 11:56 PM, Matthew Seaman wrote: plus you'll need to add a cron job to clear old entries out of the ssh-bruteforce table after a suitable amount of time has passed. Use expiretable to do that. I believe that security/expiretable is superfluous nowadays since pfctl su

Re: Security blocking question

2009-10-09 Thread Aflatoon Aflatooni
- Original Message > From: Gary Gatten > To: Adam Vande More ; Aflatoon Aflatooni > > Cc: freebsd-questions@freebsd.org > Sent: Fri, October 9, 2009 5:53:10 PM > Subject: RE: Security blocking question > > I might also add, if it's only a handfu

Re: Security blocking question

2009-10-09 Thread Matthew Seaman
Aflatoon Aflatooni wrote: Hi, The production server that has a public IP address has SSH enabled. This server is continuously under dictionary attack: Oct 8 12:58:40 seven sshd[32248]: Invalid user europa from 83.65.199.91 Oct 8 12:58:40 seven sshd[32250]: Invalid user hacked from 83.65.199.91

RE: Security blocking question

2009-10-09 Thread Gary Gatten
flatoon Aflatooni Cc: freebsd-questions@freebsd.org Subject: Re: Security blocking question On Fri, Oct 9, 2009 at 4:45 PM, Aflatoon Aflatooni wrote: > Hi, > The production server that has a public IP address has SSH enabled. This > server is continuously under dictionary attack: >

Re: Security blocking question

2009-10-09 Thread APseudoUtopia
On Fri, Oct 9, 2009 at 5:45 PM, Aflatoon Aflatooni wrote: > Hi, > The production server that has a public IP address has SSH enabled. This > server is continuously under dictionary attack: > Oct  8 12:58:40 seven sshd[32248]: Invalid user europa from 83.65.199.91 > Oct  8 12:58:40 seven sshd[3225

Re: Security blocking question

2009-10-09 Thread Jonathan Chen
On Fri, Oct 09, 2009 at 02:45:51PM -0700, Aflatoon Aflatooni wrote: [...] > Is there a way that I could configure the server so that if there are for > example X attempts from an IP address then for the next Y hours all the SSH > requests would be ignored from that IP address? > There are only

Re: Security blocking question

2009-10-09 Thread Adam Vande More
On Fri, Oct 9, 2009 at 4:45 PM, Aflatoon Aflatooni wrote: > Hi, > The production server that has a public IP address has SSH enabled. This > server is continuously under dictionary attack: > Oct 8 12:58:40 seven sshd[32248]: Invalid user europa from 83.65.199.91 > Oct 8 12:58:40 seven sshd[32250