Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 9 May 2006 11:14:42 -0400
From:      "fbsd" <fbsd@a1poweruser.com>
To:        "M. Goodell" <freebsdutah@yahoo.com>, "FreeBSD Questions" <freebsd-questions@freebsd.org>
Subject:   RE: System Intrustion Detection
Message-ID:  <MIEPLLIBMLEEABPDBIEGOEHMHGAA.fbsd@a1poweruser.com>
In-Reply-To: <20060509145403.71699.qmail@web32413.mail.mud.yahoo.com>

next in thread | previous in thread | raw e-mail | index | archive | help
check the list archives.
this subject has been beat to death many times already

-----Original Message-----
From: owner-freebsd-questions@freebsd.org
[mailto:owner-freebsd-questions@freebsd.org]On Behalf Of M. Goodell
Sent: Tuesday, May 09, 2006 10:54 AM
To: FreeBSD Questions
Subject: System Intrustion Detection


More and more each day I am seeing my root emails contain hundreds
of entries like this:

  May  8 02:23:35 warpstone sshd[26092]: Failed password for root
from 222.185.245.208 port 50519 ssh2
May  8 16:37:41 warpstone ftpd[34713]: FTP LOGIN FAILED FROM
211.44.250.152, Administrator

  Basically, people are attemtpting to hack into my server often
with a few thousands of attempts each day. What measures can I take
to stop these attempts? Is there a way I can detect these attacks
and automatically cut them off? Are any of the security ports
effective against this?

  Thank you!

  M Goodell


---------------------------------
Yahoo! Messenger with Voice. PC-to-Phone calls for ridiculously low
rates.
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
"freebsd-questions-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?MIEPLLIBMLEEABPDBIEGOEHMHGAA.fbsd>