Date: Tue, 30 Sep 2008 07:44:03 +0200 From: Lars Engels <lars.engels@0x20.net> To: Rich Healey <healey.rich@gmail.com> Cc: freebsd-hackers@freebsd.org Subject: Re: SSH Brute Force attempts Message-ID: <20080930074403.z41gl0wk1bko8c48@0x20.net> In-Reply-To: <48E16E93.3090601@gmail.com> References: <48E16E93.3090601@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
This message is in MIME format and has been PGP signed. --=_iet6cne77og Content-Type: text/plain; charset=UTF-8; DelSp="Yes"; format="flowed" Content-Disposition: inline Content-Transfer-Encoding: 7bit Quoting Rich Healey <healey.rich@gmail.com>: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Recently I'm getting a lot of brute force attempts on my server, in the > past I've used various tips and tricks with linux boxes but many of them > were fairly linux specific. > > What do you BSD guys use for this purpose? > > If this belongs on -security let me know and I'll ask over there. Just do not use password authentication but public key authentication and a reasonable passphrase on it. --=_iet6cne77og Content-Type: application/pgp-signature Content-Description: Digitale PGP-Unterschrift Content-Disposition: inline Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (FreeBSD) iEYEABECAAYFAkjhvKIACgkQKc512sD3afiMKACcCznY+qSqny+U8puquIQ/vy/6 GAgAoJF7WS2TP3OziwZup28fMzDNSs65 =uAQR -----END PGP SIGNATURE----- --=_iet6cne77og--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080930074403.z41gl0wk1bko8c48>