Date: Fri, 1 Jan 2010 21:07:34 +0100 From: J65nko <j65nko@gmail.com> To: David Rawling <djr@pdconsec.net> Cc: "freebsd-questions@FreeBSD. ORG" <freebsd-questions@freebsd.org> Subject: Re: Blocking a slow-burning SSH bruteforce Message-ID: <19861fba1001011207v5528665ct7c58db87031de947@mail.gmail.com> In-Reply-To: <4B3E2C0F.4060408@unsane.co.uk> References: <4B3E0D11.1080101@pdconsec.net> <4B3E0FBD.2010605@sbcglobal.net> <4B3E1295.9050902@pdconsec.net> <4B3E2C0F.4060408@unsane.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
After some posts a discussion on the freebsd-table mailing list goes into several approaches to deal with these SSH probes. See http://lists.freebsd.org/pipermail/freebsd-stable/2009-December/053326.html You still could allow outgoing ssh traffic on port 22 and allow incoming SSH on another port. Adriaan
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19861fba1001011207v5528665ct7c58db87031de947>