Date: Wed, 13 Jan 2010 10:06:01 +0000 From: Anton Shterenlikht <mexas@bristol.ac.uk> To: Erik Norgaard <norgaard@locolomo.org> Cc: Anton Shterenlikht <mexas@bristol.ac.uk>, freebsd-questions@freebsd.org Subject: Re: denying spam hosts ssh access - good idea? Message-ID: <20100113100601.GD23278@mech-cluster241.men.bris.ac.uk> In-Reply-To: <4B4CF95B.90207@locolomo.org> References: <20100111140105.GI61025@mech-cluster241.men.bris.ac.uk> <4B4C43EE.6080703@locolomo.org> <20100112095357.GD61863@mech-cluster241.men.bris.ac.uk> <4B4CF95B.90207@locolomo.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Jan 12, 2010 at 11:36:11PM +0100, Erik Norgaard wrote: > Anton Shterenlikht wrote: > > >> - why not let your firewall do the blocking? If your blocking is IP > >> based that's the place to block. > > > > I'm already under the University firewall. Only port 22 is let through. > > But even that filles my logs. > > What I meant was that if you want to block IPs or ranges of IPs then a > firewall is the place to block, it's efficient and simple. > > If your university firewall doesn't satisfy you there is nothing that > hinders you from configuring firewall rules on your server. thank you, I get it now. anton -- Anton Shterenlikht Room 2.6, Queen's Building Mech Eng Dept Bristol University University Walk, Bristol BS8 1TR, UK Tel: +44 (0)117 331 5944 Fax: +44 (0)117 929 4423
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100113100601.GD23278>