I have 3 sshd deamons in my border firewall, 2 in no common ports for my use, and 1 on default port (without real access) for "prevention statistics". Depending of the "prevention statistic" I design de security policy to SSH and passwords.
It nice to see the statistics of ilegal access on the default port of your sshd :) Greetings, Hernan OpenBSDeros.org On Wed, Apr 23, 2008 at 11:12 AM, Peter N. M. Hansteen <[EMAIL PROTECTED]> wrote: > "Ed Ahlsen-Girard" <[EMAIL PROTECTED]> writes: > > > When I was getting brute forced that way I just turned off remote password > > login and use keypairs exclusively. > > > > Which won't work for everybody, I guess. > > plus, of course, the fact that overload + flush global is fun to watch > > - P > -- > Peter N. M. Hansteen, member of the first RFC 1149 implementation team > http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/ > "Remember to set the evil bit on all malicious network traffic" > delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds. > > -- # /dev/hdc -> OpenBSDeros.org hdc [at] openbsderos [dot] org

