Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 1 Jan 2010 21:07:34 +0100
From:      J65nko <j65nko@gmail.com>
To:        David Rawling <djr@pdconsec.net>
Cc:        "freebsd-questions@FreeBSD. ORG" <freebsd-questions@freebsd.org>
Subject:   Re: Blocking a slow-burning SSH bruteforce
Message-ID:  <19861fba1001011207v5528665ct7c58db87031de947@mail.gmail.com>
In-Reply-To: <4B3E2C0F.4060408@unsane.co.uk>
References:  <4B3E0D11.1080101@pdconsec.net> <4B3E0FBD.2010605@sbcglobal.net> <4B3E1295.9050902@pdconsec.net> <4B3E2C0F.4060408@unsane.co.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
After some posts a discussion on the freebsd-table mailing list goes into
several approaches to deal with these SSH probes.

See http://lists.freebsd.org/pipermail/freebsd-stable/2009-December/053326.html

You still could allow outgoing ssh traffic on port 22 and allow
incoming SSH on another port.

Adriaan



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19861fba1001011207v5528665ct7c58db87031de947>