Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 9 Jun 2005 15:38:56 +0200
From:      Marcin Jessa <lists@yazzy.org>
To:        john@day-light.com
Cc:        freebsd-isp@freebsd.org
Subject:   Re: inbound ssh ceased on 4 servers at same time
Message-ID:  <20050609153856.2e349f42.lists@yazzy.org>
In-Reply-To: <NHBBKEEMKJDINKDJBJHGKEOMJAAD.john@day-light.com>
References:  <20050604174732.GG79969@numachi.com> <NHBBKEEMKJDINKDJBJHGKEOMJAAD.john@day-light.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi John, guys.

On Sat, 4 Jun 2005 13:14:28 -0500
"John Brooks" <john@day-light.com> wrote:

> Thanks, sounds good to do on the outward facing firewall. These
> four freebsd boxes are protected behind an openbsd firewall so
> none of the brute-force sshd attacks have ever reached them.

How do you filter those brute-force attacks? 
Do you check existence of users on the actual server running sshd ?
I get hundreds of those attacks every day.

Cheers,
Marcin Jessa.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050609153856.2e349f42.lists>