Hello, I personally use key authentication along with DenyUsers and AllowUsers directives from sshd. One more thing i do regarding ssh brute force is to make use of the max-src-conn and max-src-conn-rate from pf firewall.
My auth logs look like: Nov 14 11:15:36 xxx sshd: User root from 126.96.36.199 not allowed because not listed in AllowUsers Nov 14 11:15:38 xxx sshd: Invalid user admin from 188.8.131.52 Nov 14 11:15:41 xxx sshd: Invalid user test from 184.108.40.206 Nov 14 11:15:44 xxx sshd: User root from 220.127.116.11 not allowed because not listed in AllowUsers Nov 14 11:15:46 xxx sshd: Invalid user ghost from 18.104.22.168 Five tries from the above ip and if unsuccessful it gets overloaded in a table and all the states originating from that ip are killed. All the servers i have are web/mail ones, none of them is used for users, so i don't know if this is a good approach but i wrote it to help make an idea about it. a great day, v On Sat, Nov 15, 2008 at 5:00 AM, Lisa Casey <[EMAIL PROTECTED]> wrote: > > > On Fri, 14 Nov 2008, Tom Marchand wrote: > >> Or michael is vacationing in Romania. > > Very odd. Sigh, Michael is not vacationing in Romania. Doubt he's ever been > there. I got rid of the michael account (it wasn't used anyway), and > downloaded a new copy of chkrootkit, installed it and ran it along with > chklastlog and chkwtmp. Nothing was found. Pehaps this was a harmless enough > prank? Anything else I ought to look at? Fortunately the michael account did > not have te ability to su to root. > > Lisa > > _______________________________________________ > firstname.lastname@example.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "[EMAIL PROTECTED]" > _______________________________________________ email@example.com mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"