I have 3 sshd deamons in my border firewall, 2 in no common ports for
my use, and 1 on default port (without real access) for "prevention
statistics".
Depending of the "prevention statistic" I design de security policy to
SSH and passwords.

It nice to see the statistics of ilegal access on the default port of
your sshd :)

Greetings,
Hernan
OpenBSDeros.org

On Wed, Apr 23, 2008 at 11:12 AM, Peter N. M. Hansteen <[EMAIL PROTECTED]>
wrote:
> "Ed Ahlsen-Girard" <[EMAIL PROTECTED]> writes:
>
> > When I was getting brute forced that way I just turned off remote
password
> > login and use keypairs exclusively.
> >
> > Which won't work for everybody, I guess.
>
> plus, of course, the fact that overload + flush global is fun to watch
>
> - P
> --
> Peter N. M. Hansteen, member of the first RFC 1149 implementation team
> http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
> "Remember to set the evil bit on all malicious network traffic"
> delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
>
>



--
# /dev/hdc
-> OpenBSDeros.org
hdc [at] openbsderos [dot] org

Reply via email to