Date: Mon, 13 Nov 2006 13:06:52 -0500 From: Gerard Seibert <gerard@seibercom.net> To: freebsd-questions@freebsd.org Subject: Re: Blocking SSH Brute-Force Attacks: What Am I Doing Wrong? Message-ID: <200611131307.06256.gerard@seibercom.net> In-Reply-To: <45588B16.4070502@gmx.net> References: <20061113060528.GA7646@best.com> <20061113060356.E202.GERARD@seibercom.net> <45588B16.4070502@gmx.net>
next in thread | previous in thread | raw e-mail | index | archive | help
--nextPart6633658.JQjqP6KmVs Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Monday 13 November 2006 10:11, Frank Staals wrote: > The point is it isn't security through obscurity: as allready pointed > out, FreeBSD & sshd can withstand those brute force attacks without much > of a problem so there is no security problem, the only thing is those > brute force attacks are anoying since they cloud authd.log If those > attacks WERE a problem, or if there was a system which you could log in > without user & pass if you would find out the correct port then, but > only then, it is a bad idea .... Given enough time, every user/password combination can be broken. Perhaps=20 not in your lifetime, but it is still a real possibility. Given the=20 relative ease of setting up keys and simply dispersing with user/passwords= =20 all together, I fail to see why more users do not avail themselves of this= =20 avenue of security. Then again, I don't know how San Diego came back to=20 beat Cincinnati yesterday either. Anyway, each to his own! =2D-=20 Gerard A word to the wise is often enough to start an argument. --nextPart6633658.JQjqP6KmVs Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (FreeBSD) iD8DBQBFWLRJs3R1WQUU6lgRAgHbAJ96m1lq2l6d1Fz6zgkQ318wsagH5ACbB3KU PYWtS7++MFzKkJZJ3mggaxI= =KAA5 -----END PGP SIGNATURE----- --nextPart6633658.JQjqP6KmVs--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200611131307.06256.gerard>