Date: Tue, 9 May 2006 11:14:42 -0400 From: "fbsd" <fbsd@a1poweruser.com> To: "M. Goodell" <freebsdutah@yahoo.com>, "FreeBSD Questions" <freebsd-questions@freebsd.org> Subject: RE: System Intrustion Detection Message-ID: <MIEPLLIBMLEEABPDBIEGOEHMHGAA.fbsd@a1poweruser.com> In-Reply-To: <20060509145403.71699.qmail@web32413.mail.mud.yahoo.com>
next in thread | previous in thread | raw e-mail | index | archive | help
check the list archives. this subject has been beat to death many times already -----Original Message----- From: owner-freebsd-questions@freebsd.org [mailto:owner-freebsd-questions@freebsd.org]On Behalf Of M. Goodell Sent: Tuesday, May 09, 2006 10:54 AM To: FreeBSD Questions Subject: System Intrustion Detection More and more each day I am seeing my root emails contain hundreds of entries like this: May 8 02:23:35 warpstone sshd[26092]: Failed password for root from 222.185.245.208 port 50519 ssh2 May 8 16:37:41 warpstone ftpd[34713]: FTP LOGIN FAILED FROM 211.44.250.152, Administrator Basically, people are attemtpting to hack into my server often with a few thousands of attempts each day. What measures can I take to stop these attempts? Is there a way I can detect these attacks and automatically cut them off? Are any of the security ports effective against this? Thank you! M Goodell --------------------------------- Yahoo! Messenger with Voice. PC-to-Phone calls for ridiculously low rates. _______________________________________________ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?MIEPLLIBMLEEABPDBIEGOEHMHGAA.fbsd>