In the last episode (May 09), [EMAIL PROTECTED] said:
> I would suggest using ssh with RSA key pairs and passphrases only.
> Dont allow password based login or root login over ssh. Only allow
> root to login using the console and use sudo for all admin tasks.
> 
> I have not tried this myself but you could use tcpwrappers and write
> a script to add the IP address from repeated failed messages to the
> hosts.deny file. There are various scripts already written to do
> this. A quick goggle search found this
> http://security.linux.com/article.pl?sid=05/09/15/1655234 (its about
> linux but I am sure the same approach applies to FreeBSD.)

Some more links on securing ssh from password attacks:

http://la-samhna.de/library/brutessh.html

http://bsdwiki.com/wiki/Blocking_repeated_failed_login_attempts_via_SSH

-- 
        Dan Nelson
        [EMAIL PROTECTED]
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to