<div dir="ltr">I've used successfully (well, at least I believe it's successful) sshblack (<a href="http://www.pettingers.org/code/sshblack.html">http://www.pettingers.org/code/sshblack.html</a>) to block those pesky robots through iptables.<div>To get it to work correctly It's not as obvious as it seems... and there are some limitations, but once you are familiar with it, it does its job.</div><div>(In particular, the main issue of sshblack is that if not set up correctly, its database and iptables goes out of sync after a reboot of the host and it essentially fails to block login attempts. email me directly for more details).</div><div>Regards,</div><div>Fabrizio</div><div><br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, May 20, 2021 at 11:09 AM Sebastian Gottschall <<a href="mailto:s.gottschall@dd-wrt.com">s.gottschall@dd-wrt.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">what about a feature like blocking a client for N minutes if more than N <br>
times of failed logins. its relativily easy to implement and lows down <br>
brute force attacks<br>
<br>
Am 20.05.2021 um 16:44 schrieb Matt Johnston:<br>
> On Thu, May 20, 2021 at 02:29:20PM +0000, Walter Harms wrote:<br>
>> Thx for the fast response,<br>
>> for the background: little system, far-far-away land, but some script-kiddie is filling the log ...<br>
>> so no iptables or other fancy stuff. Seems i have to change that, somehow.<br>
>><br>
>> @matt:<br>
>> in case i get something working ...<br>
>> i am thinking about fnmatch and inet_ntoa would that be acceptable ?<br>
> I'm not really sure it's the job of Dropbear to be doing<br>
> that filtering. Though I wonder if it might make sense to<br>
> optionally not bother logging failed SSH auth attempts,<br>
> given how many there are...<br>
><br>
> Cheers,<br>
> Matt<br>
><br>
</blockquote></div>