Thanks Guys!! Like what Claer said, this was just for the purpose of
honeypot research. I don't care about user passwords in real world :)
Thanks for the patch.
-Parvinder Bhasin
On Apr 23, 2008, at 9:06 AM, HDC wrote:
I have 3 sshd deamons in my border firewall, 2 in no common ports for
my use, and 1 on default port (without real access) for "prevention
statistics".
Depending of the "prevention statistic" I design de security policy to
SSH and passwords.
It nice to see the statistics of ilegal access on the default port of
your sshd :)
Greetings,
Hernan
OpenBSDeros.org
On Wed, Apr 23, 2008 at 11:12 AM, Peter N. M. Hansteen <[EMAIL PROTECTED]
>
wrote:
"Ed Ahlsen-Girard" <[EMAIL PROTECTED]> writes:
When I was getting brute forced that way I just turned off remote
password
login and use keypairs exclusively.
Which won't work for everybody, I guess.
plus, of course, the fact that overload + flush global is fun to
watch
- P
--
Peter N. M. Hansteen, member of the first RFC 1149 implementation
team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673
seconds.
--
# /dev/hdc
-> OpenBSDeros.org
hdc [at] openbsderos [dot] org