badeguruji <[EMAIL PROTECTED]> writes:

> Nov  9 03:24:51 <myserver> sshd[15822]: Did not
> receive identification string from 218.76.217.234
>
> Nov 10 16:55:19 <myserver> sshd[29183]: Did not
> receive identification string from 82.207.116.209
> Nov 10 16:58:58 <myserver> sshd[21261]: Failed
> password for root from 82.207.116.209 port 35194 ssh2

We all have to deal with those at times.  As others have mentioned,
using state tracking options with an overload table is one useful way
to deal with those.  

The short recipe at <http://home.nuug.no/~peter/pf/en/bruteforce.html>
one of the more popular parts of my PF tutorial and should give you an
idea. 

And of course, if you have the time and energy, sending a canned
answer like this to whoever whois tells you is in charge may earn you
a few thank you notes as well as a depressing number of bounces for
abuse@ and similar RFC mandated addresses:

"Dear Colleague,

As can be seen from the log excerpts below, the host $bruteforcer
has made repeated attempts at accessing hosts in our network (in this
case $targethostname, at address $targetaddress - times logged are in
$timezone).  This is consistent with a variety of canned attacks
and worms.  We would appreciate your cooperation in offlining the
perpetrator.

Yours sincerely,
$yourname

[log fragment]"

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.datadok.no/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to