Re: SSH scans vs connection ratelimiting

2006-08-19 Thread Chris
On 20/08/06, Chris <[EMAIL PROTECTED]> wrote: I'm maintaining a patch for OpenSSH portable that allows configurable blocking(firewalling, ipfw,ipf,iptables) of such bruteforce attempts. I will post it if anyone is interested in it. Daniel Gerzo wrote: > Hello Pieter, > > Saturday, August 19, 200

Re: SSH scans vs connection ratelimiting

2006-08-19 Thread Chris
I'm maintaining a patch for OpenSSH portable that allows configurable blocking(firewalling, ipfw,ipf,iptables) of such bruteforce attempts. I will post it if anyone is interested in it. Daniel Gerzo wrote: > Hello Pieter, > > Saturday, August 19, 2006, 9:48:49 PM, you wrote: > > >> Gang, >>

Re: SSH scans vs connection ratelimiting

2006-08-19 Thread Daniel Gerzo
Hello Pieter, Saturday, August 19, 2006, 9:48:49 PM, you wrote: > Gang, > For months now, we're all seeing repeated bruteforce attempts on SSH. > I've configured my pf install to ratelimit TCP connections to port 22 > and to automatically add IP-addresses that connect too fast to a table > tha

Re: SSH scans vs connection ratelimiting

2006-08-19 Thread Lyndon Nerenberg
Take a look at /usr/ports/security/bruteforceblocker. It monitors the system log for failed ssh logins, and blocks the sites via pf. It's reasonably configurable, and works very well. I've been running it for months without trouble. Note that it lets you whitelist specific hosts to prevent

Re: SSH scans vs connection ratelimiting

2006-08-19 Thread Joerg Pulz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Sat, 19 Aug 2006, Pieter de Boer wrote: Gang, For months now, we're all seeing repeated bruteforce attempts on SSH. I've configured my pf install to ratelimit TCP connections to port 22 and to automatically add IP-addresses that connect too f

Re: SSH scans vs connection ratelimiting

2006-08-19 Thread Scot Hetzel
On 8/19/06, Pieter de Boer <[EMAIL PROTECTED]> wrote: This works as expected, IP-addresses are added to the 'lamers'-table every once in a while. However, there apparently are SSH bruteforcers that simply use one connection to perform a brute-force attack: Aug 18 00:00:01 aberdeen sshd[87989]:

SSH scans vs connection ratelimiting

2006-08-19 Thread Pieter de Boer
Gang, For months now, we're all seeing repeated bruteforce attempts on SSH. I've configured my pf install to ratelimit TCP connections to port 22 and to automatically add IP-addresses that connect too fast to a table that's filtered: table { } block quick from to any pass in quick on $e