Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 12 Jan 2010 23:36:11 +0100
From:      Erik Norgaard <norgaard@locolomo.org>
To:        Anton Shterenlikht <mexas@bristol.ac.uk>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: denying spam hosts ssh access - good idea?
Message-ID:  <4B4CF95B.90207@locolomo.org>
In-Reply-To: <20100112095357.GD61863@mech-cluster241.men.bris.ac.uk>
References:  <20100111140105.GI61025@mech-cluster241.men.bris.ac.uk> <4B4C43EE.6080703@locolomo.org> <20100112095357.GD61863@mech-cluster241.men.bris.ac.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
Anton Shterenlikht wrote:

>> - why not let your firewall do the blocking? If your blocking is IP 
>> based that's the place to block.
> 
> I'm already under the University firewall. Only port 22 is let through.
> But even that filles my logs.

What I meant was that if you want to block IPs or ranges of IPs then a 
firewall is the place to block, it's efficient and simple.

If your university firewall doesn't satisfy you there is nothing that 
hinders you from configuring firewall rules on your server.

Cheers, Erik

-- 
Erik Nørgaard
Ph: +34.666334818/+34.915211157                  http://www.locolomo.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B4CF95B.90207>