tech-net archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Options for dealing with sshd brute force attacks



On Sat 28 Dec 2024 at 20:23:11 +0000, John Klos wrote:
> Hi,
> 
> We all know that public facing ssh servers will get tons of brute force
> attacks. That's just a fact of life.
> 
> For many machines, running blocklistd helps tremendously. But what happens
> when blocklistd won't help because npf can't be used?
> 
> OpenSSH doesn't use tcpwrappers any longer, but I suppose I could launch it
> from inetd as one option.
> 
> One machine has had more than 300,000 attempted logins in the last twenty
> hours. Password based authentication is off, so I'm not worried about anyone
> getting in, but it's making logging in difficult due to MaxStartups and it's
> noticeably raising the load of the machine.
> 
> What would people recommend here?

In pkgsrc there is security/pam-af which keeps the same sort of
information as blacklistd, but using PAM instead of being generic.
It is configured using the pam_af_tool which stored the config in the
same database.

-Olaf.
-- 
___ Olaf 'Rhialto' Seibert                            <rhialto/at/falu.nl>
\X/ There is no AI. There is just someone else's work.           --I. Rose

Attachment: signature.asc
Description: PGP signature



Home | Main Index | Thread Index | Old Index