--- On Wed, 3/30/11, nagygabor88 <[email protected]> wrote:

> From: nagygabor88 <[email protected]>
> Subject: a GOOD idea to harden OpenSSH!
> To: "OpenSSH list" <[email protected]>
> Date: Wednesday, March 30, 2011, 12:19 PM
>
> 
> if a user wants to connect to an ssh server then he have to
> wait a couple of seconds, then he can write his passphare. 
> the "couple of seconds" is defined in the sshd config,
> e.g.: 2 seconds 
> the method musn't show that the user have to wait 2 seconds
> to write his passphare. 
> 

This can already be similarly done using iptables, with entries such as:
$IPTABLES -N SSH_CHECK
$IPTABLES -I INPUT -p tcp --dport 22 -m state --state NEW -j SSH_CHECK
$IPTABLES -A SSH_CHECK -m recent --set --name SSH
$IPTABLES -A SSH_CHECK -m recent --update --seconds 180 --hitcount 5 --rttl 
--name SSH -j LOG --log-prefix "SSH_brute_force "
$IPTABLES -A SSH_CHECK -m recent --update --seconds 180 --hitcount 5 --rttl 
--name SSH -j DROP

What this does:  If I get more than 5 hits within 180 seconds, block them for 
180 seconds.


Reply via email to