Blocking SSH access based on bad logins?
brian at brianwhalen.net
Tue Aug 25 15:36:29 UTC 2015
The other thing I like about denyhosts is there is an option where u can
upload your bad host data to a server and other users can optionally select
to receive that data and add it to their hosts.whatever file.
On Aug 25, 2015 8:29 AM, "Adam Vande More" <amvandemore at gmail.com> wrote:
> On Tue, Aug 25, 2015 at 10:22 AM, Brian W. <brian at brianwhalen.net> wrote:
>> There is a port called denyhosts that works pretty well. There is a single
>> configuration file and you just edit that to what you want. It adds a
>> hosts.deniedssh file that it writes data to based on log activity.
> Technically, you add the /etc/hosts.deniedssh file and that is really just
> an arbitrary design. It could just as well be /etc/hosts.allow for many
> Also denyhosts is still the only blocker which is able to proactively
> block known bad hosts(and not by default). At least is used to work, not
> sure if that part still does.
More information about the freebsd-questions