Re: Security blocking question

2009-10-16 Thread Matthew Seaman
Aflatoon Aflatooni wrote: Is there a way that I could configure the server so that if there are for example X attempts from an IP address then for the next Y hours all the SSH requests would be ignored from that IP address? There are only a handful of people who have access to that server.

Re: Security blocking question

2009-10-16 Thread Aflatoon Aflatooni
Aflatoon Aflatooni wrote: Is there a way that I could configure the server so that if there are for example X attempts from an IP address then for the next Y hours all the SSH requests would be ignored from that IP address? There are only a handful of people who have access to that

Re: Security blocking question

2009-10-16 Thread Matthew Seaman
Aflatoon Aflatooni wrote: I have the following in my pf.conf: ext_if=bge0 # Public Services -- smtp, http, pop3s tcpPubServices = { 25, 80, 995 } set timeout { interval 10, frag 30 } set timeout { tcp.first 120, tcp.opening 30, tcp.established 86400 } set timeout { tcp.closing 900,

Re: Security blocking question

2009-10-15 Thread Aflatoon Aflatooni
Is there a way that I could configure the server so that if there are for example X attempts from an IP address then for the next Y hours all the SSH requests would be ignored from that IP address? There are only a handful of people who have access to that server. Yes. In pf.conf:

Re: Security blocking question

2009-10-10 Thread Matthew Seaman
Svante Kvarnstrom wrote: On Oct 9, 2009, at 11:56 PM, Matthew Seaman wrote: plus you'll need to add a cron job to clear old entries out of the ssh-bruteforce table after a suitable amount of time has passed. Use expiretable to do that. I believe that security/expiretable is superfluous

Security blocking question

2009-10-09 Thread Aflatoon Aflatooni
Hi, The production server that has a public IP address has SSH enabled. This server is continuously under dictionary attack: Oct  8 12:58:40 seven sshd[32248]: Invalid user europa from 83.65.199.91 Oct  8 12:58:40 seven sshd[32250]: Invalid user hacked from 83.65.199.91 Oct  8 12:58:40 seven

Re: Security blocking question

2009-10-09 Thread Adam Vande More
On Fri, Oct 9, 2009 at 4:45 PM, Aflatoon Aflatooni aaflato...@yahoo.comwrote: Hi, The production server that has a public IP address has SSH enabled. This server is continuously under dictionary attack: Oct 8 12:58:40 seven sshd[32248]: Invalid user europa from 83.65.199.91 Oct 8 12:58:40

Re: Security blocking question

2009-10-09 Thread Jonathan Chen
On Fri, Oct 09, 2009 at 02:45:51PM -0700, Aflatoon Aflatooni wrote: [...] Is there a way that I could configure the server so that if there are for example X attempts from an IP address then for the next Y hours all the SSH requests would be ignored from that IP address? There are only a

Re: Security blocking question

2009-10-09 Thread APseudoUtopia
On Fri, Oct 9, 2009 at 5:45 PM, Aflatoon Aflatooni aaflato...@yahoo.com wrote: Hi, The production server that has a public IP address has SSH enabled. This server is continuously under dictionary attack: Oct  8 12:58:40 seven sshd[32248]: Invalid user europa from 83.65.199.91 Oct  8 12:58:40

RE: Security blocking question

2009-10-09 Thread Gary Gatten
: freebsd-questions@freebsd.org Subject: Re: Security blocking question On Fri, Oct 9, 2009 at 4:45 PM, Aflatoon Aflatooni aaflato...@yahoo.comwrote: Hi, The production server that has a public IP address has SSH enabled. This server is continuously under dictionary attack: Oct 8 12:58:40

Re: Security blocking question

2009-10-09 Thread Matthew Seaman
Aflatoon Aflatooni wrote: Hi, The production server that has a public IP address has SSH enabled. This server is continuously under dictionary attack: Oct 8 12:58:40 seven sshd[32248]: Invalid user europa from 83.65.199.91 Oct 8 12:58:40 seven sshd[32250]: Invalid user hacked from

Re: Security blocking question

2009-10-09 Thread Aflatoon Aflatooni
- Original Message From: Gary Gatten ggat...@waddell.com To: Adam Vande More amvandem...@gmail.com; Aflatoon Aflatooni aaflato...@yahoo.com Cc: freebsd-questions@freebsd.org Sent: Fri, October 9, 2009 5:53:10 PM Subject: RE: Security blocking question I might also add

Re: Security blocking question

2009-10-09 Thread Svante Kvarnstrom
On Oct 9, 2009, at 11:56 PM, Matthew Seaman wrote: plus you'll need to add a cron job to clear old entries out of the ssh-bruteforce table after a suitable amount of time has passed. Use expiretable to do that. I believe that security/expiretable is superfluous nowadays since pfctl