On Sat, 19 Apr 2008 10:02:50 -0400
"Vikas N Kumar" <[EMAIL PROTECTED]> wrote:

> Hi
> 
> I have OpenBSD 4.2 on a Pentium II laptop running fine, with its ssh
> port 22 open to the web. However, there are a lot of attacks on that
> port from various IP addresses across the globe. Even though I have
> set maximum number of tries to just 2, I would like to be able to
> note down the IP address (after say 10 unsuccessful login attempts)
> from where the attacks are coming in and then dynamically add them to
> hosts.deny for the next few days or permanently.
> 
> Can pf do this ? I read the manual but could not find such a feature.
> 
> I can always write a cron script that reads the messages log file and
> does this sort of thing, but I was hoping that if such a feature
> pre-exists I wouldn't have to do it.
> 
> Any help will be appreciated.
> 
> Thanks & Regards
> Vikas

There was a topic in a misc 2008-04-16 with subject "PF ssh bruteforce
logging and blocking". You should read it.

-- 
Henri Salo <fgeek at hack.fi> +358407705733
GPG ID: 2EA46E4F  fp: 14D0 7803 BFF6 EFA0 9998  8C4B 5DFE A106 2EA4 6E4F

Reply via email to