On Fri, Jan 11 2008 at 24:11, Lars Nood?n wrote:
> Kennith Mann III wrote:
> > ...
> > While moving the SSH port doesn't help much against anyone running an
> > nmap scan, it stops blind port 22 scans that run generic password
> > hacks and filling your logs with crap,
> 
> Overloads help a bit:
> 
>       pass in on $ext_if proto tcp to ($ext_if) port ssh
>        flags S/SA keep state (max-src-conn 4, \
>        max-src-conn-rate 2/60, overload <bruteforce> \
>        flush global)
> 
> Regarding the logs, one thing that worked in the past was giving the
> netblock owner a hard time.  It's their responsibility.  It's not too
> hard to make up a shellscript (or use another scripting language) which
> automates a daily report and the complaint.

I always hesitate to use this trick. Could you please develop more the
implications of this method? Is it still effective?

Thanks!

Claer

Reply via email to