Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 22 Dec 2006 10:38:11 -0500
From:      Vivek Khera <vivek@khera.org>
To:        FreeBSD Stable <freebsd-stable@freebsd.org>
Subject:   Re: Block IP
Message-ID:  <F01AFF5C-63D0-4F2A-B590-8F05DA77FF5E@khera.org>
In-Reply-To: <458AF5BA.5020908@optusnet.com.au>
References:  <200612211533.kBLFXLaW090581@lurza.secnetix.de> <458AE462.1020100@vindaloo.com> <458AF5BA.5020908@optusnet.com.au>

next in thread | previous in thread | raw e-mail | index | archive | help

--Apple-Mail-1--483868922
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=US-ASCII;
	delsp=yes;
	format=flowed


On Dec 21, 2006, at 3:59 PM, Graham Menhennitt wrote:

> Christopher Hilton wrote:
>> If it's at all possible switch to using public keys for  
>> authentication
>> with ssh and disallow password authentication. This completely stops
>> the brute forcing attacks from filling up your periodic security  
>> mail.
> Are you sure about that? I only allow PublickeyAuthentication ssh2
> connections but I get lots of security mail messages like:
>

Be sure to disallow PAM auth also.  I missed that one the first time  
I tried to disable interactive keyboard auth login.


--Apple-Mail-1--483868922--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?F01AFF5C-63D0-4F2A-B590-8F05DA77FF5E>