Date: Sun, 5 Oct 2008 04:24:42 +0200 (CEST) From: sk@elegosoft.com To: "Eitan Adler" <eitanadlerlist@gmail.com> Cc: freebsd-current@freebsd.org Subject: Re: SSH Brute Force attempts Message-ID: <4046.82.41.242.250.1223173482.squirrel@mail.elegosoft.com> In-Reply-To: <48E4368E.4020404@gmail.com> References: <48E16E93.3090601@gmail.com> <48E4368E.4020404@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
mornin' Rich Healey wrote: >> Recently I'm getting a lot of brute force attempts on my server, in the >> past I've used various tips and tricks with linux boxes but many of them >> were fairly linux specific. disable pasword authentication OR use very strong passwords (24 chars) OR use OTP if it is applicable you could limit access by hosts (from=) nothing of the above is linux or BSD specific btw. Software to delay Login Attempts could be tricked. > Personally I find that changing the port to anything other than 22 stops > a lot of the skiddie brute force attacks. Thats not to say you > shouldn't use something else as well - but it is something. it works for one of my servers too, but is security by obscurity regards Stefan
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4046.82.41.242.250.1223173482.squirrel>