From owner-freebsd-hackers@FreeBSD.ORG Tue Sep 30 10:00:07 2008 Return-Path: Delivered-To: freebsd-hackers@FreeBSD.ORG Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9B21E1065698 for ; Tue, 30 Sep 2008 10:00:07 +0000 (UTC) (envelope-from des@des.no) Received: from tim.des.no (tim.des.no [194.63.250.121]) by mx1.freebsd.org (Postfix) with ESMTP id 83CBD8FC1F for ; Tue, 30 Sep 2008 10:00:04 +0000 (UTC) (envelope-from des@des.no) Received: from ds4.des.no (des.no [84.49.246.2]) by smtp.des.no (Postfix) with ESMTP id 866362087; Tue, 30 Sep 2008 12:00:03 +0200 (CEST) Received: by ds4.des.no (Postfix, from userid 1001) id 651D6844EE; Tue, 30 Sep 2008 12:00:03 +0200 (CEST) From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= To: freebsd-hackers@FreeBSD.ORG References: <200809300822.m8U8MMXV026149@lurza.secnetix.de> Date: Tue, 30 Sep 2008 12:00:03 +0200 In-Reply-To: <200809300822.m8U8MMXV026149@lurza.secnetix.de> (Oliver Fromme's message of "Tue, 30 Sep 2008 10:22:22 +0200 (CEST)") Message-ID: <86abdqkl7g.fsf@ds4.des.no> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.0.60 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Cc: healey.rich@gmail.com Subject: Re: SSH Brute Force attempts X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 30 Sep 2008 10:00:07 -0000 Oliver Fromme writes: > If you're merely annoyed about the large amount of logging entries > caused by the break-in attempts, a good solution is to move the sshd > service from the standard port 22 to a different, non-standard port The best choice is 443, as many corporate firewalls, especially "guest" wifi networks, block all but a few ports (usually 22, 80 and 443, and sometimes 25). There are other, more complicated tricks you can play; for instance, you could set up a web server on the box, and configure it to tunnel SSH using the HTTP Upgrade header; this would require modifications to both ssh (to send the initial HTTP request) and sshd (to take over the connection from the web server). DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no