Date: Sun, 26 Jun 2005 10:30:11 -0500 From: "Ninneman, TJ" <terry@twopeasinabucket.com> To: <freebsd-pf@freebsd.org> Subject: Outbound SSH problem Message-ID: <200506261530.j5QFUBZU007706@outbound4.mail.tds.net>
next in thread | raw e-mail | index | archive | help
>Yes, RTFMP , with a default policy of block, there is no need for specific >rules to stop things like outbound ssh traffic. > >Logging will tell you the rest. Yes, I'm compromised or yes, I'm misreading the output? Like I said in my original post, logging isn't telling me anything; just the daily security run or /var/log/pf.today. While a default to deny policy will stop outbound ssh, you'll notice in my ruleset that I am allowing everything out on this server so that rule is necessary. I just really would like to know if these outbound ssh packets are nothing or if I have a problem on my hands. Thanks for the help! Terry J. Ninneman
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200506261530.j5QFUBZU007706>