Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Nov 2002 22:46:54 -0600
From:      "Kevin D. Kinsey, DaleCo, S.P." <kdk@daleco.biz>
To:        "Kevin D. Kinsey, DaleCo, S.P." <kdk@daleco.biz>, "Stephen Hovey" <shovey@buffnet.net>, "W. D." <WD@US-Webmasters.com>
Cc:        <freebsd-questions@FreeBSD.ORG>
Subject:   Re: How to stop SPAMMER??!
Message-ID:  <017801c2893d$5cd098a0$fa00a8c0@DaleCoportable>
References:  <5.1.0.14.2.20021110034425.04b7c9d0@us-webmasters.com> <5.1.0.14.2.20021110210555.046f49d0@us-webmasters.com> <00aa01c2893a$49b06280$fa00a8c0@DaleCoportable>

next in thread | previous in thread | raw e-mail | index | archive | help
From: "Kevin D. Kinsey, DaleCo, S.P." <kdk@daleco.biz>

> From: "W. D." <WD@US-Webmasters.com>
> Subject: Re: How to stop SPAMMER??!
> 
> 
> Well, now we see why the file comments suggest that wrapping
> sshd is *not* such a good idea......
> 
> Get the IP block of the system(s) from which you are remotely
> adminning the server into hosts.allow with something like this
> at the top:
> 
> all:  192.168.0.0/255.255.255.0 : allow
> 
> This is a sample netblock that makes sure hosts on my/the*
> LAN have access to the machine....figure out the netblock
> of your ISP at the home, office, or home office, and try,
> try, again.....
> 
> HTH,
> 
> Kevin Kinsey
> DaleCo, S.P.
> 
> *Your LAN may differ, of course.....

And, FWIW, hosts.allow is pretty 'ready to go'
straight from 'the box.'  Lots of examples......

Also, if I remember the O.P., you're running
4.4 or 4.5----are you keeping up with patches?
Surely an upgrade would be in order to address
any issues that appeared over the summer...

My $.02

Kevin Kinsey



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?017801c2893d$5cd098a0$fa00a8c0>