Date: Mon, 9 Aug 2010 23:36:57 -0400 From: "Matt Emmerton" <matt@gsicomp.on.ca> To: "James Harrison" <oscartheduck@gmail.com> Cc: questions@freebsd.org Subject: Re: ssh under attack - sessions in accepted state hogging CPU Message-ID: <5BF5E75C429145B39DCBF8DC4F7B10CC@hermes> References: <ED433058084C4B0FAE9C516075BF0440@hermes> <EDE343D4-0B69-4425-B987-302EF5A7FED0@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> > I know there's not much I can do about the brute force attacks, but will > > upgrading openssh avoid these stuck connections? > > 1. switch over to using solely RSA keys In the works; I have too many users to convert :( > 2. switch to a non-standard port This is not attractive, even though it would be effective. I tried this once already and my support volume skyrocketed so I had to switch back. > 3. what version of openssh are you currently using? Whatever ships with 8.0-REL, which appears to be: OpenSSL> version OpenSSL 0.9.8k 25 Mar 2009 Regards, -- Matt
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5BF5E75C429145B39DCBF8DC4F7B10CC>