Re: SSH Brute Force attempts

2008-10-01 Thread Eitan Adler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Rich Healey wrote: > Recently I'm getting a lot of brute force attempts on my server, in the > past I've used various tips and tricks with linux boxes but many of them > were fairly linux specific. > > What do you BSD guys use for this purpose? > > I

Re: SSH Brute Force attempts

2008-09-30 Thread Igor Mozolevsky
2008/9/30 Oliver Fromme <[EMAIL PROTECTED]>: > > Bill Moran wrote: > > In response to Oliver Fromme <[EMAIL PROTECTED]>: > > > Pierre Riteau wrote: > > > > > > > Because the 3-way handshake ensures that the source address is > not being > > > > spoofed, more aggressive action can be

Re: SSH Brute Force attempts

2008-09-30 Thread Oliver Fromme
Bill Moran wrote: > In response to Oliver Fromme <[EMAIL PROTECTED]>: > > Pierre Riteau wrote: > > > > > Because the 3-way handshake ensures that the source address is not > > > being > > > spoofed, more aggressive action can be taken based on these limits. > > > > s/not being

Re: SSH Brute Force attempts

2008-09-30 Thread Bill Moran
In response to Oliver Fromme <[EMAIL PROTECTED]>: > Pierre Riteau wrote: > > > Because the 3-way handshake ensures that the source address is not > being > > spoofed, more aggressive action can be taken based on these limits. > > s/not being spoofed/more difficult to spoofe/ ;-) O

Re: SSH Brute Force attempts

2008-09-30 Thread Oliver Fromme
Pierre Riteau wrote: > Oliver Fromme wrote: > > Ollivier Robert wrote: > > > According to Henrik Hudson: > > > > Yeap, -security > > > > > > > > However, also try this in pf.conf (specific rules related to this; > > > > you'll need > > > > more for a real pf.conf): > > > > > > > > tab

Re: SSH Brute Force attempts

2008-09-30 Thread Pierre Riteau
On Tue, Sep 30, 2008 at 04:01:26PM +0200, Oliver Fromme wrote: > Ollivier Robert <> wrote: > > According to Henrik Hudson: > > > Yeap, -security > > > > > > However, also try this in pf.conf (specific rules related to this; > you'll need > > > more for a real pf.conf): > > > > > > table

Re: SSH Brute Force attempts

2008-09-30 Thread Daniel Gerzo
Hello guys, On Mon, 29 Sep 2008 20:30:33 -0700, Jeremy Chadwick <[EMAIL PROTECTED]> wrote: > On Tue, Sep 30, 2008 at 10:10:59AM +1000, Rich Healey wrote: >> Recently I'm getting a lot of brute force attempts on my server, in the >> past I've used various tips and tricks with linux boxes but many

Re: SSH Brute Force attempts

2008-09-30 Thread Matthew Seaman
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Oliver Fromme wrote: | Ollivier Robert <> wrote: | > According to Henrik Hudson: | > > Yeap, -security | > > | > > However, also try this in pf.conf (specific rules related to this; you'll need | > > more for a real pf.conf): | > > | >

Re: SSH Brute Force attempts

2008-09-30 Thread Oliver Fromme
Ollivier Robert <> wrote: > According to Henrik Hudson: > > Yeap, -security > > > > However, also try this in pf.conf (specific rules related to this; you'll > > need > > more for a real pf.conf): > > > > table { } persist > > block in quick from > > pass in on $ext_if proto tcp fro

Re: SSH Brute Force attempts

2008-09-30 Thread Lars Engels
Quoting Rich Healey <[EMAIL PROTECTED]>: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Recently I'm getting a lot of brute force attempts on my server, in the past I've used various tips and tricks with linux boxes but many of them were fairly linux specific. What do you BSD guys use for this

Re: SSH Brute Force attempts

2008-09-30 Thread Dag-Erling Smørgrav
Oliver Fromme <[EMAIL PROTECTED]> writes: > If you're merely annoyed about the large amount of logging entries > caused by the break-in attempts, a good solution is to move the sshd > service from the standard port 22 to a different, non-standard port The best choice is 443, as many corporate fire

Re: SSH Brute Force attempts

2008-09-30 Thread Jeremy Chadwick
On Tue, Sep 30, 2008 at 09:56:32AM +0200, Jeroen Ruigrok van der Werven wrote: > -On [20080930 05:14], Rich Healey ([EMAIL PROTECTED]) wrote: > >What do you BSD guys use for this purpose? > > I actually use blockhosts, which is a Python solution you tie into > hosts.allow. > > http://www.aczoom.c

Re: SSH Brute Force attempts

2008-09-30 Thread Oliver Fromme
Rich Healey wrote: > Recently I'm getting a lot of brute force attempts on my server, in the > past I've used various tips and tricks with linux boxes but many of them > were fairly linux specific. > > What do you BSD guys use for this purpose? There's nothing that replaces using either *goo

Re: SSH Brute Force attempts

2008-09-30 Thread Ollivier Robert
According to Henrik Hudson: > Yeap, -security > > However, also try this in pf.conf (specific rules related to this; you'll > need > more for a real pf.conf): > > table { } persist > block in quick from > pass in on $ext_if proto tcp from any to ($ext_if) port ssh keep state > (max-src-conn

Re: SSH Brute Force attempts

2008-09-30 Thread Jeroen Ruigrok van der Werven
-On [20080930 05:14], Rich Healey ([EMAIL PROTECTED]) wrote: >What do you BSD guys use for this purpose? I actually use blockhosts, which is a Python solution you tie into hosts.allow. http://www.aczoom.com/cms/blockhosts -- Jeroen Ruigrok van der Werven / asmodai イェルーン ラウフロック ヴァン デル ウェルヴェン ht

Re: SSH Brute Force attempts

2008-09-30 Thread Bob Bishop
Hi, On 30 Sep 2008, at 01:10, Rich Healey wrote: Recently I'm getting a lot of brute force attempts on my server, in the past I've used various tips and tricks with linux boxes but many of them were fairly linux specific. What do you BSD guys use for this purpose? [various solutions prop

Re: SSH Brute Force attempts

2008-09-29 Thread Matthew Seaman
Jeremy Chadwick wrote: You naturally have to keep pf.conf.ssh-* in sync if you have multiple machines. You can use pfsync(4) to accomplish this task (I think), or you can do it the obvious way (make a central distribution box that scp/rsync's the files out and runs "/etc/rc.d/pf reload"). pfs

Re: SSH Brute Force attempts

2008-09-29 Thread Henrik Hudson
On Monday 29 September 2008, Rich Healey <[EMAIL PROTECTED]> sent a missive stating: > Recently I'm getting a lot of brute force attempts on my server, in the > past I've used various tips and tricks with linux boxes but many of them > were fairly linux specific. > > What do you BSD guys use for

Re: SSH Brute Force attempts

2008-09-29 Thread Glenn Sieb
Rich Healey said the following on 9/29/08 8:10 PM: > Recently I'm getting a lot of brute force attempts on my server, in the > past I've used various tips and tricks with linux boxes but many of them > were fairly linux specific. > > What do you BSD guys use for this purpose? > > If this belongs on

Re: SSH Brute Force attempts

2008-09-29 Thread Bill Moran
Rich Healey <[EMAIL PROTECTED]> wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Recently I'm getting a lot of brute force attempts on my server, in the > past I've used various tips and tricks with linux boxes but many of them > were fairly linux specific. > > What do you BSD guys

Re: SSH Brute Force attempts

2008-09-29 Thread Jeremy Chadwick
On Tue, Sep 30, 2008 at 10:10:59AM +1000, Rich Healey wrote: > Recently I'm getting a lot of brute force attempts on my server, in the > past I've used various tips and tricks with linux boxes but many of them > were fairly linux specific. > > What do you BSD guys use for this purpose? This proba

SSH Brute Force attempts

2008-09-29 Thread Rich Healey
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Recently I'm getting a lot of brute force attempts on my server, in the past I've used various tips and tricks with linux boxes but many of them were fairly linux specific. What do you BSD guys use for this purpose? If this belongs on -security let m