Hi,

I would suggest using ssh with RSA key pairs and passphrases only. Dont 
allow password based login or root login over ssh. Only allow root to 
login using the console and use sudo for all admin tasks.

I have not tried this myself but you could use tcpwrappers and write a 
script to add the IP address from repeated failed messages to the 
hosts.deny file. There are various scripts already written to do this. A 
quick goggle search found this 
http://security.linux.com/article.pl?sid=05/09/15/1655234 (its about linux 
but I am sure the same approach applies to FreeBSD.)

Hope this helps
John

[EMAIL PROTECTED] wrote on 09/05/2006 15:54:03:

> More and more each day I am seeing my root emails contain hundreds 
> of entries like this:
> 
>   May  8 02:23:35 warpstone sshd[26092]: Failed password for root 
> from 222.185.245.208 port 50519 ssh2
> May  8 16:37:41 warpstone ftpd[34713]: FTP LOGIN FAILED FROM 211.44.
> 250.152, Administrator
> 
>   Basically, people are attemtpting to hack into my server often 
> with a few thousands of attempts each day. What measures can I take 
> to stop these attempts? Is there a way I can detect these attacks 
> and automatically cut them off? Are any of the security ports 
> effective against this?
> 
>   Thank you!
> 
>   M Goodell
> 
> 
> ---------------------------------
> Yahoo! Messenger with Voice. PC-to-Phone calls for ridiculously low 
rates.
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to 
"[EMAIL PROTECTED]"
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to