From owner-freebsd-stable@FreeBSD.ORG Tue Dec 29 16:10:46 2009 Return-Path: Delivered-To: freebsd-stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id DADEF106566B for ; Tue, 29 Dec 2009 16:10:46 +0000 (UTC) (envelope-from brian@brianwhalen.net) Received: from numail.brianwhalen.net (numail.brianwhalen.net [66.93.34.172]) by mx1.freebsd.org (Postfix) with ESMTP id B4ADE8FC12 for ; Tue, 29 Dec 2009 16:10:46 +0000 (UTC) Received: by numail.brianwhalen.net (Postfix, from userid 65534) id 8EE582841E; Tue, 29 Dec 2009 08:10:42 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on numail.brianwhalen.net X-Spam-Level: X-Spam-Status: No, score=0.1 required=3.0 tests=RDNS_DYNAMIC autolearn=no version=3.2.5 Received: from [127.0.0.1] (dsl093-034-235.snd1.dsl.speakeasy.net [66.93.34.235]) by numail.brianwhalen.net (Postfix) with ESMTP id DF69E28433 for ; Tue, 29 Dec 2009 08:10:38 -0800 (PST) Message-ID: <4B3A2A02.1090509@brianwhalen.net> Date: Tue, 29 Dec 2009 08:10:42 -0800 From: "Brian W." User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0 MIME-Version: 1.0 To: freebsd-stable@freebsd.org References: <4B20B509.4050501@yahoo.it> <600C0C33850FFE49B76BDD81AED4D25801371D8056@IMCMBX3.MITRE.ORG> <600C0C33850FFE49B76BDD81AED4D25801371D8737@IMCMBX3.MITRE.ORG> <20091229114536.GA2409@mavetju.org> In-Reply-To: <20091229114536.GA2409@mavetju.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: Hacked - FreeBSD 7.1-Release X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Dec 2009 16:10:46 -0000 On 12/29/2009 3:45 AM, Edwin Groothuis wrote: > mpt to pass a Turing test or something. > > On all systems which need to be accessible from the public Internet: > Run sshd on port 22 and port 8022. Block incoming traffic on port > 22 on your firewall. > > Everybody coming from the outside world needs to know it is running > on port 8022. Everybody coming from the inside world has access as > normal. > > Edwin > I seem to recall on one of the openbsd lists someone speaking of risks of running sshd or other services on high numbered ports, presumably because a non root user cannot bind ports up to 1024. Brian