From owner-FreeBSD-users-jp@jp.FreeBSD.org Fri May 19 19:39:12 2006
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6p2+3.4W/8.11.3) id k4JAdCW50203;
	Fri, 19 May 2006 19:39:12 +0900 (JST)
	(envelope-from owner-FreeBSD-users-jp@jp.FreeBSD.org)
Received: from lily.finetune.co.jp (lily.finetune.co.jp [210.226.85.226])
	by castle.jp.FreeBSD.org (8.11.6p2+3.4W/8.11.3) with ESMTP/inet id k4JAdBQ50198
	for <FreeBSD-users-jp@jp.FreeBSD.org>; Fri, 19 May 2006 19:39:12 +0900 (JST)
	(envelope-from lyuka@finetune.co.jp)
Received: from sakura.finetune.co.jp (sakura.finetune.co.jp [192.168.72.34])
	by lily.finetune.co.jp (8.9.3/3.6W) with ESMTP id TAA15415
	for <FreeBSD-users-jp@jp.FreeBSD.org>; Fri, 19 May 2006 19:39:06 +0900 (JST)
Received: from [127.0.0.1] by sakura.finetune.co.jp (8.9.3/3.6W-smtp) id TAA24296; Fri, 19 May 2006 19:39:05 +0900 (JST)
Message-ID: <446DA049.4090607@finetune.co.jp>
From: Takayuki Hosoda <lyuka@finetune.co.jp>
User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; ja-JP; rv:1.7.13) Gecko/20060424
X-Accept-Language: ja, en-us, en, ko, zh-tw, zh-hk
MIME-Version: 1.0
To: FreeBSD-users-jp@jp.FreeBSD.org
References: <446ADF07.30005@nifty.ne.jp>	<200605170846.k4H8kLJO013891@atlantis.seaside.homeip.net>	<20060517181934.863143a0.yanagisawa@csg.is.titech.ac.jp> <ygebqtx7yyu.wl%ume@mahoroba.org>
In-Reply-To: <ygebqtx7yyu.wl%ume@mahoroba.org>
Content-Type: text/plain; charset=ISO-2022-JP
Content-Transfer-Encoding: 7bit
Reply-To: FreeBSD-users-jp@jp.FreeBSD.org
Precedence: list
Date: Fri, 19 May 2006 19:39:05 +0900
X-Sequence: FreeBSD-users-jp 89592
Subject: [FreeBSD-users-jp 89592] Re: 6.1 =?ISO-2022-JP?B?GyRCJEcbKEI=?=
 ssh =?ISO-2022-JP?B?GyRCQFxCMxsoQg==?= 
Sender: owner-FreeBSD-users-jp@jp.FreeBSD.org
X-Originator: lyuka@finetune.co.jp
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+060209

$B:YED!w%U%!%$%s%A%e!<%s$G$9!#(B

FreeBSD-4.11-STABLE $B$G(B maxlogins $B$H$$$&(B perl $B%9%/%j%W%H$,;H$($F$$$^$9!#(B

http://www.teamits.com/resources/

-- $B0zMQ$3$3$+$i(B --
This program tracks repeated bad ssh login attempts and adds offending
IP addresses to /etc/hosts.allow to block further access after a
specified number of attempts. Documentation is at the end of the program
code (perldoc maxlogins.pl).

Syntax: (n/a, called automatically)
-- $B$3$3$^$G(B --

$B$4;29M$^$G!#(B
