Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 29 Dec 2009 08:10:42 -0800
From:      "Brian W." <brian@brianwhalen.net>
To:        freebsd-stable@freebsd.org
Subject:   Re: Hacked - FreeBSD 7.1-Release
Message-ID:  <4B3A2A02.1090509@brianwhalen.net>
In-Reply-To: <20091229114536.GA2409@mavetju.org>
References:  <bd52e0bd614fbaffcf8c9ff9da35286e@mail.isot.com>	<4B20B509.4050501@yahoo.it>	<600C0C33850FFE49B76BDD81AED4D25801371D8056@IMCMBX3.MITRE.ORG>	<ce92ed41260c438977298c2cf9dd1e3f.HRCIM@webmail.1command.com>	<600C0C33850FFE49B76BDD81AED4D25801371D8737@IMCMBX3.MITRE.ORG> <20091229114536.GA2409@mavetju.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 12/29/2009 3:45 AM, Edwin Groothuis wrote:
> mpt to pass a Turing test or something.
>    
> On all systems which need to be accessible from the public Internet:
> Run sshd on port 22 and port 8022. Block incoming traffic on port
> 22 on your firewall.
>
> Everybody coming from the outside world needs to know it is running
> on port 8022. Everybody coming from the inside world has access as
> normal.
>
> Edwin
>    
I seem to recall on one of the openbsd lists someone speaking of risks 
of running sshd or other services on high numbered ports, presumably 
because a non root user cannot bind ports up to 1024.

Brian




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B3A2A02.1090509>