From owner-freebsd-security@FreeBSD.ORG Sat Sep 18 13:58:29 2004 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 06A7216A4CE for ; Sat, 18 Sep 2004 13:58:29 +0000 (GMT) Received: from probsd.org (rrcs-24-199-182-230.midsouth.biz.rr.com [24.199.182.230]) by mx1.FreeBSD.org (Postfix) with ESMTP id B03E643D49 for ; Sat, 18 Sep 2004 13:58:28 +0000 (GMT) (envelope-from ms@probsd.org) Received: from localhost (jail [192.168.1.4]) by probsd.org (Postfix) with ESMTP id 6294A9E5AD for ; Sat, 18 Sep 2004 09:58:36 -0400 (EDT) Received: from probsd.org ([192.168.1.4]) by localhost (jail [192.168.1.4]) (amavisd-new, port 10024) with ESMTP id 55579-01 for ; Sat, 18 Sep 2004 09:58:35 -0400 (EDT) Received: from probsd.org (jail [192.168.1.4]) by probsd.org (Postfix) with ESMTP id 397859E560 for ; Sat, 18 Sep 2004 09:58:35 -0400 (EDT) Received: from 192.168.1.1 (SquirrelMail authenticated user ms); by probsd.org with HTTP; Sat, 18 Sep 2004 09:58:35 -0400 (EDT) Message-ID: <3434.192.168.1.1.1095515915.squirrel@192.168.1.1> In-Reply-To: References: Date: Sat, 18 Sep 2004 09:58:35 -0400 (EDT) From: "Michael Sharp" To: freebsd-security@freebsd.org User-Agent: SquirrelMail/1.4.3 X-Mailer: SquirrelMail/1.4.3 MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Virus-Scanned: by amavisd-new at probsd.org - Isn't it ironic Subject: Re: Re: Attacks on ssh port X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Security issues [members-only posting] List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 18 Sep 2004 13:58:29 -0000 > as ive read this is an attack from some kiddie trying to build a floodnet. One really dosent want to exposed root to the Internet either via SSH. Please Consider adding a user(s) that need root to a user acct, open SSH for them, then consider su or sudo from there. Michael