Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 9 Aug 2010 23:35:39 -0400
From:      "Matt Emmerton" <matt@gsicomp.on.ca>
To:        "James Harrison" <oscartheduck@gmail.com>
Cc:        questions@freebsd.org
Subject:   Re: ssh under attack - sessions in accepted state hogging CPU
Message-ID:  <F751E518EF274C37AC37DAD1E67D8254@hermes>
References:  <ED433058084C4B0FAE9C516075BF0440@hermes> <EDE343D4-0B69-4425-B987-302EF5A7FED0@gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
> > I know there's not much I can do about the brute force attacks, but will 
> > upgrading openssh avoid these stuck connections?
>
> 1. switch over to using solely RSA keys

In the works; I have too many users to convert :(

> 2. switch to a non-standard port

This is not attractive, even though it would be effective.  I tried this 
once already and my support volume skyrocketed.

> 3. what version of openssh are you currently using?

Whatever ships with 8.0-REL, which appears to be:


Best

James= 




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?F751E518EF274C37AC37DAD1E67D8254>