Date: Sun, 28 Aug 2005 17:03:02 +0200 From: Benjamin Lutz <benlutz@datacomm.ch> To: freebsd-questions@freebsd.org Subject: Re: Illegal access attempt - FreeBSD 5.4 Release - please advise Message-ID: <4311D226.7040907@datacomm.ch> In-Reply-To: <4310FE6C.6050401@nawcom.no-ip.com> References: <810a540e0508232127737d91fb@mail.gmail.com> <200508241119671.SM00756@chris> <20050825112237.GE45634@topper.cteresource.org> <1125008688.39123.14.camel@maarten> <4310FE6C.6050401@nawcom.no-ip.com>
next in thread | previous in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig5A2BBE0874FBE95365C8C3F7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit I'm seeing those as well. The connection attempts are harmless, but annoying, since they fill up the logs. I decided to "solve" the problem by restricting the IP range that can access my sshd to the class-A blocks that are most commonly used in my country. Maybe it's not a truly elegant solution, but it's simple, and it works. Cheers Benjamin --------------enig5A2BBE0874FBE95365C8C3F7 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (Darwin) iD8DBQFDEdIpgShs4qbRdeQRAkwsAJ9PvlVunWu2iqP0+Xyw4L4hwrxmRwCeN5as egVk/XaE1A9h5MogR2dEvgo= =D9dV -----END PGP SIGNATURE----- --------------enig5A2BBE0874FBE95365C8C3F7--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4311D226.7040907>