pavement

Block repeated illegal or failed SSH logins

From FreeBSDwiki
Revision as of 00:42, 18 August 2009 by 200.164.74.75 (Talk)
Jump to: navigation, search

Introduction

We're starting to see a rash of password guessing attacks via SSH on exposed BSD servers which are running the SSH daemon. These login attempts are coming from multiple addresses, which makes some people suspect that they're being carried out by a network of "bots" rather than a single attacker.

Limiting SSH login sessions

In your sshd_config file the following settings can also help slow down such attacks.

  • LoginGraceTime
The server disconnects after this time if the user has not successfully logged in. If the value is 0, there is no time limit. The default
Personal tools