From owner-freebsd-security Mon Jun 24 6:10:17 2002 Delivered-To: freebsd-security@freebsd.org Received: from imail.softnet.ro (imail.SoftNet.ro [193.231.173.29]) by hub.freebsd.org (Postfix) with ESMTP id 475A137B404 for ; Mon, 24 Jun 2002 06:10:11 -0700 (PDT) Received: from softnet.ro [80.96.141.227] by imail.softnet.ro with ESMTP (SMTPD32-7.04) id ABEB1340102; Mon, 24 Jun 2002 16:17:31 +0300 Message-ID: <3D171A40.3030400@softnet.ro> Date: Mon, 24 Jun 2002 16:10:24 +0300 From: Florin MANAILA Organization: Xforce NOC User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.2.1) Gecko/20010901 X-Accept-Language: en-us MIME-Version: 1.0 To: freebsd-security@freebsd.org Subject: SSH ACL . Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Re all, Is posible to make an ACK with ipfw or something else to deny all ssh trafic even when is made on sshd that are running on port's gt 1022 ?? - something like sniffing the packets , and deny anything regarding SSH connections. Best regards, Florin MANAILA To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message