Date: Mon, 28 Dec 2009 17:50:23 -0600 From: Adam Vande More <amvandemore@gmail.com> To: Chris H <chris#@1command.com> Cc: freebsd-stable@freebsd.org Subject: Re: Hacked - FreeBSD 7.1-Release Message-ID: <6201873e0912281550w34937b9eg3498547722739aee@mail.gmail.com> In-Reply-To: <8bdcbc5f08e9b762c3d2dcfe2fd00558.HRCIM@webmail.1command.com> References: <bd52e0bd614fbaffcf8c9ff9da35286e@mail.isot.com> <4B20B509.4050501@yahoo.it> <600C0C33850FFE49B76BDD81AED4D25801371D8056@IMCMBX3.MITRE.ORG> <ce92ed41260c438977298c2cf9dd1e3f.HRCIM@webmail.1command.com> <600C0C33850FFE49B76BDD81AED4D25801371D8737@IMCMBX3.MITRE.ORG> <8bdcbc5f08e9b762c3d2dcfe2fd00558.HRCIM@webmail.1command.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Dec 28, 2009 at 4:59 PM, Chris H <chris#@1command.com> wrote: > > My point here was that by increasing the verbosity, you will more easily be > able > to grep against login /failures/, and more easily discover dictionary/ > brute-force > attacks. It's certainly made my job easier, and hasn't required any > modifications > to our current policies. You /have/ considered PF(4), haven't you? It's > /really/ > an excellent strategy for securing your network. > > --Chris H > > To unsubscribe, send any mail to "freebsd-stable-unsubscribe@freebsd.org" > I use security/denyhosts for this, very simple to setup like 5 minutes if you're a fast reader. There are other options as well that offer similar functionality. -- Adam Vande More
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6201873e0912281550w34937b9eg3498547722739aee>