Date: Fri, 05 Mar 2010 16:11:30 -0800 From: merlyn@stonehenge.com (Randal L. Schwartz) To: Tim Judd <tajudd@gmail.com> Cc: John <john@starfire.mn.org>, freebsd-questions@freebsd.org, Programmer In Training <pit@joseph-a-nagy-jr.us> Subject: Re: Thousands of ssh probes Message-ID: <86lje6z4ul.fsf@blue.stonehenge.com> In-Reply-To: <ade45ae91003051243g631542c0td756cb09db97157e@mail.gmail.com> (Tim Judd's message of "Fri, 5 Mar 2010 13:43:03 -0700") References: <20100305125446.GA14774@elwood.starfire.mn.org> <4B910139.1080908@joseph-a-nagy-jr.us> <20100305132604.GC14774@elwood.starfire.mn.org> <ade45ae91003051243g631542c0td756cb09db97157e@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
>>>>> "Tim" == Tim Judd <tajudd@gmail.com> writes: Tim> I've been in that same boat. I eventually came to the decision to: Tim> Install PPTP server software, accepting connections from any IP. Whoa. Here we are, talking about making it *more* secure, and you go the other direction.... http://en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol#Security_of_the_PPTP_protocol In short, you can't take anyone seriously who suggests PPTP when talking about security. -- Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095 <merlyn@stonehenge.com> <URL:http://www.stonehenge.com/merlyn/> Smalltalk/Perl/Unix consulting, Technical writing, Comedy, etc. etc. See http://methodsandmessages.vox.com/ for Smalltalk and Seaside discussion
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86lje6z4ul.fsf>