Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 13 Jan 2010 10:06:01 +0000
From:      Anton Shterenlikht <mexas@bristol.ac.uk>
To:        Erik Norgaard <norgaard@locolomo.org>
Cc:        Anton Shterenlikht <mexas@bristol.ac.uk>, freebsd-questions@freebsd.org
Subject:   Re: denying spam hosts ssh access - good idea?
Message-ID:  <20100113100601.GD23278@mech-cluster241.men.bris.ac.uk>
In-Reply-To: <4B4CF95B.90207@locolomo.org>
References:  <20100111140105.GI61025@mech-cluster241.men.bris.ac.uk> <4B4C43EE.6080703@locolomo.org> <20100112095357.GD61863@mech-cluster241.men.bris.ac.uk> <4B4CF95B.90207@locolomo.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Jan 12, 2010 at 11:36:11PM +0100, Erik Norgaard wrote:
> Anton Shterenlikht wrote:
> 
> >> - why not let your firewall do the blocking? If your blocking is IP 
> >> based that's the place to block.
> > 
> > I'm already under the University firewall. Only port 22 is let through.
> > But even that filles my logs.
> 
> What I meant was that if you want to block IPs or ranges of IPs then a 
> firewall is the place to block, it's efficient and simple.
> 
> If your university firewall doesn't satisfy you there is nothing that 
> hinders you from configuring firewall rules on your server.

thank you, I get it now.

anton

-- 
Anton Shterenlikht
Room 2.6, Queen's Building
Mech Eng Dept
Bristol University
University Walk, Bristol BS8 1TR, UK
Tel: +44 (0)117 331 5944
Fax: +44 (0)117 929 4423



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100113100601.GD23278>