-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Rich Healey wrote:
> Recently I'm getting a lot of brute force attempts on my server, in the
> past I've used various tips and tricks with linux boxes but many of them
> were fairly linux specific.
>
> What do you BSD guys use for this purpose?
>
> I
2008/9/30 Oliver Fromme <[EMAIL PROTECTED]>:
>
> Bill Moran wrote:
> > In response to Oliver Fromme <[EMAIL PROTECTED]>:
> > > Pierre Riteau wrote:
> > >
> > > > Because the 3-way handshake ensures that the source address is
> not being
> > > > spoofed, more aggressive action can be
Bill Moran wrote:
> In response to Oliver Fromme <[EMAIL PROTECTED]>:
> > Pierre Riteau wrote:
> >
> > > Because the 3-way handshake ensures that the source address is not
> > > being
> > > spoofed, more aggressive action can be taken based on these limits.
> >
> > s/not being
In response to Oliver Fromme <[EMAIL PROTECTED]>:
> Pierre Riteau wrote:
>
> > Because the 3-way handshake ensures that the source address is not
> being
> > spoofed, more aggressive action can be taken based on these limits.
>
> s/not being spoofed/more difficult to spoofe/ ;-)
O
Pierre Riteau wrote:
> Oliver Fromme wrote:
> > Ollivier Robert wrote:
> > > According to Henrik Hudson:
> > > > Yeap, -security
> > > >
> > > > However, also try this in pf.conf (specific rules related to this;
> > > > you'll need
> > > > more for a real pf.conf):
> > > >
> > > > tab
On Tue, Sep 30, 2008 at 04:01:26PM +0200, Oliver Fromme wrote:
> Ollivier Robert <> wrote:
> > According to Henrik Hudson:
> > > Yeap, -security
> > >
> > > However, also try this in pf.conf (specific rules related to this;
> you'll need
> > > more for a real pf.conf):
> > >
> > > table
Hello guys,
On Mon, 29 Sep 2008 20:30:33 -0700, Jeremy Chadwick <[EMAIL PROTECTED]>
wrote:
> On Tue, Sep 30, 2008 at 10:10:59AM +1000, Rich Healey wrote:
>> Recently I'm getting a lot of brute force attempts on my server, in the
>> past I've used various tips and tricks with linux boxes but many
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Oliver Fromme wrote:
| Ollivier Robert <> wrote:
| > According to Henrik Hudson:
| > > Yeap, -security
| > >
| > > However, also try this in pf.conf (specific rules related to this; you'll need
| > > more for a real pf.conf):
| > >
| >
Ollivier Robert <> wrote:
> According to Henrik Hudson:
> > Yeap, -security
> >
> > However, also try this in pf.conf (specific rules related to this; you'll
> > need
> > more for a real pf.conf):
> >
> > table { } persist
> > block in quick from
> > pass in on $ext_if proto tcp fro
Quoting Rich Healey <[EMAIL PROTECTED]>:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Recently I'm getting a lot of brute force attempts on my server, in the
past I've used various tips and tricks with linux boxes but many of them
were fairly linux specific.
What do you BSD guys use for this
Oliver Fromme <[EMAIL PROTECTED]> writes:
> If you're merely annoyed about the large amount of logging entries
> caused by the break-in attempts, a good solution is to move the sshd
> service from the standard port 22 to a different, non-standard port
The best choice is 443, as many corporate fire
On Tue, Sep 30, 2008 at 09:56:32AM +0200, Jeroen Ruigrok van der Werven wrote:
> -On [20080930 05:14], Rich Healey ([EMAIL PROTECTED]) wrote:
> >What do you BSD guys use for this purpose?
>
> I actually use blockhosts, which is a Python solution you tie into
> hosts.allow.
>
> http://www.aczoom.c
Rich Healey wrote:
> Recently I'm getting a lot of brute force attempts on my server, in the
> past I've used various tips and tricks with linux boxes but many of them
> were fairly linux specific.
>
> What do you BSD guys use for this purpose?
There's nothing that replaces using either *goo
According to Henrik Hudson:
> Yeap, -security
>
> However, also try this in pf.conf (specific rules related to this; you'll
> need
> more for a real pf.conf):
>
> table { } persist
> block in quick from
> pass in on $ext_if proto tcp from any to ($ext_if) port ssh keep state
> (max-src-conn
-On [20080930 05:14], Rich Healey ([EMAIL PROTECTED]) wrote:
>What do you BSD guys use for this purpose?
I actually use blockhosts, which is a Python solution you tie into
hosts.allow.
http://www.aczoom.com/cms/blockhosts
--
Jeroen Ruigrok van der Werven / asmodai
イェルーン ラウフロック ヴァン デル ウェルヴェン
ht
Hi,
On 30 Sep 2008, at 01:10, Rich Healey wrote:
Recently I'm getting a lot of brute force attempts on my server, in
the
past I've used various tips and tricks with linux boxes but many of
them
were fairly linux specific.
What do you BSD guys use for this purpose?
[various solutions prop
Jeremy Chadwick wrote:
You naturally have to keep pf.conf.ssh-* in sync if you have multiple
machines. You can use pfsync(4) to accomplish this task (I think), or
you can do it the obvious way (make a central distribution box that
scp/rsync's the files out and runs "/etc/rc.d/pf reload").
pfs
On Monday 29 September 2008, Rich Healey <[EMAIL PROTECTED]> sent a
missive stating:
> Recently I'm getting a lot of brute force attempts on my server, in the
> past I've used various tips and tricks with linux boxes but many of them
> were fairly linux specific.
>
> What do you BSD guys use for
Rich Healey said the following on 9/29/08 8:10 PM:
> Recently I'm getting a lot of brute force attempts on my server, in the
> past I've used various tips and tricks with linux boxes but many of them
> were fairly linux specific.
>
> What do you BSD guys use for this purpose?
>
> If this belongs on
Rich Healey <[EMAIL PROTECTED]> wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Recently I'm getting a lot of brute force attempts on my server, in the
> past I've used various tips and tricks with linux boxes but many of them
> were fairly linux specific.
>
> What do you BSD guys
On Tue, Sep 30, 2008 at 10:10:59AM +1000, Rich Healey wrote:
> Recently I'm getting a lot of brute force attempts on my server, in the
> past I've used various tips and tricks with linux boxes but many of them
> were fairly linux specific.
>
> What do you BSD guys use for this purpose?
This proba
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Recently I'm getting a lot of brute force attempts on my server, in the
past I've used various tips and tricks with linux boxes but many of them
were fairly linux specific.
What do you BSD guys use for this purpose?
If this belongs on -security let m
22 matches
Mail list logo